1 Go to View/Master/Slide Master to type in header Propelling Business Growth With A Secure And Continuous Information Infrastructure Jon Murray.

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

Copyright © 2006 Quest Software Quest SharePoint Management.
Mission Critical Messaging Platform Roni Havas Unified Communications Solution Specialist Specialists Technology Unit – EPG - Microsoft Israel
Which server is right for you? Get in Contact with us
Introduction to Systems Management Server 2003 Tyler S. Farmer Sr. Technology Specialist II Education Solutions Group Microsoft Corporation.
RETHINK BACKUP & ARCHIVE. 2 Backup and Archive are Top IT Priorities Which of the following would you consider to be your org’s most important IT priorities.
Protect Your Business and Simplify IT with Symantec and VMware Presenter, Title, Company Date.
EarthLink Business IT Services. EarthLink Business IT Services Comprehensive IT and network services portfolio −Data center, virtualization, security,
MARCO TECHNOLOGY SEMINAR Sponsored By:. 2:15-2:30 p.m. Registration and Welcome 2:30-4:30 p.m.Cisco Networking, Video and Data Center 4:30-5:15 p.m. EMC.
1 Storage Today Victor Hatridge – CIO Nashville Electric Service (615)
High Availability Group 08: Võ Đức Vĩnh Nguyễn Quang Vũ
1 Disk Based Disaster Recovery & Data Replication Solutions Gavin Cole Storage Consultant SEE.
Backup Modernization with NetBackup Appliances
VMware Virtualization Last Update Copyright Kenneth M. Chipps Ph.D.
11© 2011 Hitachi Data Systems. All rights reserved. HITACHI DATA DISCOVERY FOR MICROSOFT® SHAREPOINT ® SOLUTION SCALING YOUR SHAREPOINT ENVIRONMENT PRESENTER.
Iron Mountain’s Continuity Service ©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered.
Disaster Recovery Solutions
Hitachi Sepaton and Symantec NetBackup Powerful Protection Together
Barracuda Backup Service Data Backup and Disaster Recovery.
1 © Copyright 2010 EMC Corporation. All rights reserved. EMC RecoverPoint/Cluster Enabler for Microsoft Failover Cluster.
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
Why Improve Datacenter Automation? “ Studies show up to 80% of network availability incidents and 60% of security issues can be tied to human error” CIO.
Keith Burns Microsoft UK Mission Critical Database.
Do More In Less Time Will Schoen Microsoft Corporation April 12, 2011 Realize the future of government productivity with online and.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
1© Copyright 2011 EMC Corporation. All rights reserved. EMC RECOVERPOINT/ CLUSTER ENABLER FOR MICROSOFT FAILOVER CLUSTER.
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice HP StorageWorks LeftHand update Marcus.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
EarthLink Business IT Services. EarthLink Business IT Services Snapshot Comprehensive IT services portfolio −Data center, virtualization, IT security,
1 © Copyright 2008 EMC Corporation. All rights reserved. New EMC Next-Generation Backup, Recovery, and Archive Capabilities Driving Down the Cost and Risk.
1© Copyright 2013 EMC Corporation. All rights reserved. EMC and Microsoft SharePoint Server Performance Name Title Date.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Sample Title Slide Standard Template Presenter’s Name, Title Date PROTECTION DATA (re)DEFINED.
1 © Copyright 2009 EMC Corporation. All rights reserved. Agenda Storing More Efficiently  Storage Consolidation  Tiered Storage  Storing More Intelligently.
November 2009 Network Disaster Recovery October 2014.
1© Copyright 2013 EMC Corporation. All rights reserved. EMC and Microsoft SharePoint Server Data Protection Name Title Date.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
The Virtualized Enterprise MORE FUNCTIONALITY AND REDUCED IT SPEND Speaker: Frank Grillo EVP of Marketing CYPRESS COMMUNICATIONS.
1 EMC CONFIDENTIAL—INTERNAL USE ONLY EMC’s End-to-End Capabilities for Microsoft EMC helps you successfully plan, design, deploy and manage your Microsoft.
STEALTH Content Store for SharePoint using Caringo CAStor  Boosting your SharePoint to the MAX! "Optimizing your Business behind the scenes"
NetBackup PureDisk Kris Hagerman Sr. Vice President, Data Center Management.
DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection.
SOLUTIONS FOR THE EFFICIENT ENTERPRISE Sameer Garde Country GM,India.
Dell Connected Security Solutions Simplify & unify.
IT Infrastructure Chap 1: Definition
Windows Vista, 2007 Office system, and Exchange 2007 Better Together.
© 2009 EMC Corporation. All rights reserved. Introduction to Information Storage and Management Module 1.1.
Chapter © 2006 The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/ Irwin Chapter 7 IT INFRASTRUCTURES Business-Driven Technologies 7.
Storage Trends: DoITT Enterprise Storage Gregory Neuhaus – Assistant Commissioner: Enterprise Systems Matthew Sims – Director of Critical Infrastructure.
1 IBM TIVOLI Business Continuance Seminar Training Document.
The Best DR and “Undo” Virus Attacks!! What can Zerto do for you?
Dell Confidential Dell Database Solutions: SQL Server 2005 APR 2006.
The Power of Aligning Backup, Recovery, and Archive Bob Madaio Sr. Manager; Backup, Recovery and Archive Marketing EMC Corporation.
Microsoft and Symantec
Disaster Recovery: Can Your Business Survive Data Loss? DR Strategies for Today and Tomorrow.
Be Microsoft’s first and best customer Enabling world-class and predictable customer, client, and partner experience Protecting Microsoft’s physical and.
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
1 Calgary SharePoint Users Group The Challenges of Office 365.
Solving Today’s Data Protection Challenges with NSB 1.
Commvault and Nutanix October Changing IT landscape Today’s Challenges Datacenter Complexity Building for Scale Managing disparate solutions.
Microsoft Connect /23/ :39 PM
Azure Site Recovery For Hyper-V, VMware, and Physical Environments
Delivering on the Promise of a Virtualized Dynamic Data Center
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
How to prepare for the End of License of Windows Server 2012/R2
Storage Trends: DoITT Enterprise Storage
Contact Center Security Strategies
Presentation transcript:

1 Go to View/Master/Slide Master to type in header Propelling Business Growth With A Secure And Continuous Information Infrastructure Jon Murray

2 Go to View/Master/Slide Master to type in header Information: Change in Multiple Dimensions information growth information types information uses information regulations more regulations: SEC 17a-4, NASD 3010,Sarbanes-Oxley, Basel II, UK Metadata, eSign Act, 21 CFR Part 11 (more coming!) more growth: information stored on disk arrays growing ~60% in 2006 more uses: ERP, CRM, RFID, collaboration, data mining, discovery … more types: transactions, documents, forms, web, images, voice, messages, reports...

3 Go to View/Master/Slide Master to type in header Customers’ Information Storage and Management Challenges CIO’s Dilemma: How to manage all the information growth with limited resources? Information stored on disk arrays ~ 70% IT budget growth ~ 4 - 5% IT environment getting more complex SLA’s continue to expand and tighten Protection and security increasingly important

4 Go to View/Master/Slide Master to type in header 2006 Technology Spending Priorities–CIO Survey Source: Morgan Stanley November CIO Survey, Jan. 3, Security (Software) 2. Security (HW & Services) 3. Storage Area Networks 4. Wireless LAN (access points & routers) 5. Storage Software 6. Portal Software 7. VOIP Infrastructure 8. IT Education and Training 9. Storage Hardware 10. Business Intelligence Software 11.Wireless LAN (clients) 12.New Custom Development 13.Routing 14.Systems Management Software 15.Application Integration Software 16.Notebook PCs 17.Document Management Software 18.Automated Testing Tool 19.Microsoft Office Upgrade 20.Application Software Server 45.Mainframe hardware 46.Printers

5 Go to View/Master/Slide Master to type in header Security Today An Amalgamation of Point Products Across IT Antivirus Anitvirus VPN Encryption Authentication Web Filtering Authentication Threat Detection Change/Patch Management LAN Clients Servers SAN Disk Storage Tape Spyware Firewall Digital Rights Management Encryption Vault Recovery Management Authentication

6 Go to View/Master/Slide Master to type in header Today’s Approach: Secure the Perimeter

7 Go to View/Master/Slide Master to type in header Security Tomorrow: Protect the Information

8 Go to View/Master/Slide Master to type in header Security Must Become Information-Centric  Information-centric Security –An inside-out view of how to secure information  Begins with securing the data itself  Moves out through layers of increasingly intelligent infrastructure  Relies on our ability to leverage the interaction between data and infrastructure Important Technology Data-level access control Open policy decision points Enforcement at point of use

9 Go to View/Master/Slide Master to type in header Information Security (Confidentiality) Information Security Information Security Information Availability Information Confidentiality Information Integrity EMC’s Heritage Protection and A Natural and Requested Evolution of EMC’s Data Protection Capabilities

10 Go to View/Master/Slide Master to type in header EMC’s Security Efforts to Date CEO-level Mandate Information Security Leadership Team Company-wide Goals and Objectives Security-related Workshops, Assessments EMC Vulnerability Alert Service Documentum Trusted Content Services EMC Secure Remote Support Data Erasure Service DRM for ECM Software-native Encryption –Retrospect and NetWorker Data Encryption through EMC Select Dedicated Focus Security of Offering Comprehensive Information Protection

11 Go to View/Master/Slide Master to type in header ID and Access Management Threat Management Encryption Secure Content Vulnerability Management EMC Security Mission ApplicationsInformationPeopleSystems Security Services Patching Vulnerability Assessment Security Risk Management Security Configuration Security Event Management / Managed Security Intrusion Detect / Prevent Firewall / VPN Threat Appliances Anti-Virus/Malware Secure Messaging Web Filtering Encryption File / Database Security Digital Rights Mgmt Authentication Authentication Mgmt Authentication Authentication Mgmt Provisioning End-to-End Information Security Management EMC ISM

12 Go to View/Master/Slide Master to type in header EMC’s Information-Centric Approach to Security EMC Strategy  Expose key native capabilities  Repurpose existing technologies for security “use cases”  Develop new products, solutions, and service offerings  Partner and acquire to complete portfolio 12 Information Security Management (ISM)  Information Security is an end-to-end challenge  To be most effective, security capabilities must be integrated with the information infrastructure  All security offerings need to be interoperable and open

13 Go to View/Master/Slide Master to type in header EMC Retrospect EMC Networker EMC Secure Remote Support EMC Documentum Trusted Content Services VMware Assured Computing Environment Digital Rights Management (with partners) What is Happening with Information Security ? Hard to know where to start define requirements establish services catalog identify gaps create plan monitor effectiveness hardware NeoScale Decru Kasten Chase Cipheroptics software Storage Security Assessment Service SAN Security Best Practices NAS Security Best Practices Data Erasure Services services

14 Go to View/Master/Slide Master to type in header Secure Content Management ACLs MACL EAL4 Common Criteria Testing 2 Trusted Content Services Information Object

15 Go to View/Master/Slide Master to type in header ESG Strategy for Enterprise Archiving Retain Migrate Discover Common Archiving Record and Storage (CARS) Secure, scalable, and unified archive for all types of content Rich Media / IM Desktop & File System SharePoint Web Paper Applications & Reports Classify

16 Go to View/Master/Slide Master to type in header New Architecture for Backup, Recovery, and Archive  Extract valuable information to archive –Increases performance of production applications –Improves TCO through use of tiered storage –Recovers capacity on Tier 1 resources  Back up active production information –Backup window reduced or eliminated –Higher reliability, greater likelihood of full backups  Retrieve from archive or recover from backup –Restore requests are faster –Information that was once offline is now online via archive     Archive process Recovery process Production

17 Go to View/Master/Slide Master to type in header Backup and Archive are Different BackupArchive A secondary copy of informationPrimary copy of information Used for recovery operationsAvailable for information retrieval Improves availability by enabling application to be restored to point in time Adds operational efficiencies by moving fixed / unstructured content out of operational environment Typically short-term (weeks or months) Typically long-term (months, years, or decades) Data typically overwritten on periodic basis (e.g., monthly) Data typically maintained for analysis, value generation, or compliance Not for regulatory compliance— though some are forced to use Useful for compliance and should take into account information-retention policy

18 Go to View/Master/Slide Master to type in header Continuity Reduce Total Cost Improve Business Value  Minimize under-protection  Flexibility to change  Improving productivity  Eliminate over-protection  Simplified environment  Consolidated continuity

19 Go to View/Master/Slide Master to type in header Continuity Challenge: The Common Current State Not protected Under- protected Different requirements Different technologies Different processes Over- protected Continuity Issues  Survive a disaster  Achieve high availability  Prevent data corruption  Non-disruptively upgrade software and/or hardware  Do parallel processing  Move and migrate data  Restart the enterprise  Protect remote data sites  Shorten backup and restore times  Contain costs  Cannot add resources Pain Points  Inconsistent service levels  Gaps in coverage  Growth in complexity and effort  Growth in cost and risk to the business Continuity Defined: Ensuring applications and data are available during planned and unplanned outages.

20 Go to View/Master/Slide Master to type in header CDP to Disk SECONDS HOURS/ MINUTES Backup to Disk Backup to Tape DAYS/ HOURS Snap / Clone MINUTES/ SECONDS Operational Effectiveness Decreased Recovery Time / Increased Recovery Point Granularity Information Protection is Evolving Beyond Tape Backup… Replication < SECONDS Common Recovery Management Services Automated and Simplified Management Disaster Recovery, Operational Recovery, and Testing/Migration

21 Go to View/Master/Slide Master to type in header Products and Technologies Platform LocalRemote SAN Backup Recovery SAN Remote Information Remote processing Clustering across site with Storage DR aware Multi-site SAN

22 Go to View/Master/Slide Master to type in header Products and Technologies Platform Storage, switch, and server protection Backup Frequent, consistent, non-disruptive backups Recovery Quick, accurate, predictable recovery Remote Information All critical data safe at remote location Remote processing Automatic processing resumption: “lights out” Multi-site Increasing distance improves protection LocalRemote Information Protection & Recovery SRDF Family MirrorView AutoStart Family TimeFinder Family SnapView EMC SnapSure PowerPath NetWorker Celerra Replicator RepliStor

23 Go to View/Master/Slide Master to type in header Getting Started: Sample Customer Requirements Plan Service LevelBronzeSilverGoldPlatinum Service ClassNon-criticalBusiness urgentBusiness-criticalMission-critical Site TypeWarm siteHot site Standby site (manual failover) Standby site (automatic failover) RTO +/- <72 hours up to (+/-) <5 days+/- 24 hours up to (+/-) 3 days+/- 6 hours up to (+/-) 12 hours+/- 1 hours up to (+/-) 3 hours RPO +/- 24 hours up to (+/-) 3 days  Sync = 0 data loss  Async = acceptable data loss *(Potential for 0 data loss for Async)  Sync = 0 data loss  Async = acceptable data loss Recovery Service  OS: restored from tape and validated  Application: restored from tape and validated  Data: restored from tape and validated  Connectivity: restored and validated  Redundancy of data: recover lost transaction and validate  Redundant site: ready (warm site)  Recovery plans: ready  OS: restored from tape and validated  Application: restored from tape and validated  Data: restored from tape and validated  Connectivity: restored and validated  Redundancy of data: recover lost transaction and validate  OS: ready  Application: ready  Data: ready  Connectivity: repoint network  Redundancy of data: store and forward, tape back up of site  Recovery plans: ready  Testing: quarterly after significant  OS: ready  Application: ready  Data: ready  Connectivity: repoint network  Redundancy of data: store and forward, tape backup of site  Redundant site: ready  Recovery plans: ready  Testing: quarterly after significant Application Type  Desktop applications  Corporate tax systems  Travel systems  Human resources  Some desktop applications  Corporate tax system  Travel systems  Payroll  Document imaging  Accounting systems (ERP)  Inventory control / distribution  Credit card processing  Cash management  Accounting systems (ERP)  Inventory control / distribution  Credit card processing  Cash management

24 Go to View/Master/Slide Master to type in header Customer Needs “Not all information is created equal” Tiered Storage that Is Optimized for Business Requirements Budget CapacityAvailabilityCompliance Performance Business Applications ERP CRM Exchange Archive

25 Go to View/Master/Slide Master to type in header EMC Retrospect EMC Networker EMC Secure Remote Support EMC Documentum Trusted Content Services VMware Assured Computing Environment Digital Rights Management (with partners) What is Happening with Information Security ? define requirements establish services catalog identify gaps create plan monitor effectiveness hardware NeoScale Decru Kasten Chase Cipheroptics software Storage Security Assessment Service SAN Security Best Practices NAS Security Best Practices Data Erasure Services services where to start

26 Go to View/Master/Slide Master to type in header Building a Next-Generation Information Infrastructure Information protection and security Information Lifecycle Management Flexible infrastructure Next-Generation Information Infrastructure

27 Go to View/Master/Slide Master to type in header