SlideShare a Scribd company logo
1 of 17
Download to read offline
1EMC CONFIDENTIAL—INTERNAL USE ONLY
Data Domain, Avamar
Dumitru Taraianu – Presales, EMC SEE
Backup & Recovery
2EMC CONFIDENTIAL—INTERNAL USE ONLY
Back-up to Disk: Capacity = €€€€€€€
Primary Data
1x
Back-up Data
15x-20x
3EMC CONFIDENTIAL—INTERNAL USE ONLY
Backup Is Evolving
Backup/Recovery
Architecture
on premise off premise
Conventional
(Tape-centric)
Transformational
(Disk-centric)
Backup/Media
Manager
Onsite Backup
Storage
Disaster
Recovery
Storage
Application
Backup
Clients
Deduplication storageBackup Software
Deduplication backup software and system
Backup Software VTL VTL
Backup Software VTL Tape
Backup Software Tape Tape
VM
4EMC CONFIDENTIAL—INTERNAL USE ONLY
EMC Backup Restore Systems
Backup/Recovery
Architecture
on premise off premise
Conventional
(Tape-centric)
Transformational
(Disk-centric)
Backup/Media
Manager
Onsite Backup
Storage
Disaster
Recovery
Storage
Application
Backup
Clients
Data DomainNetWorker
Avamar
NetWorker Disk Libr Disk Libr
NetWorker Disk Libr Tape
NetWorker Tape Tape
VM
5EMC CONFIDENTIAL—INTERNAL USE ONLY
EMC BRS Market Position
 Avamar
– #1 deduplication backup software worldwide
– 4,500 installations
– 2,500 customers
 Data Domain
– #1 deduplication storage worldwide
– 9,500 installations
– 3,500 customers
 Disk Library
– #1 VTL worldwide
– >$1B Sales
 NetWorker
– Top three enterprise backup
– 30,000 customers
6EMC CONFIDENTIAL—INTERNAL USE ONLY
Structured Data
EMC Backup & Archive Portfolio
NetWorker
Unstructured Data Virtualized Servers
App
OS
App
OS
ESX Server
Avamar
Data Domain / Disk Library
Data Protection Advisor
Avamar VM
2TB
Industries 1st Virtual
Backup Server
7EMC CONFIDENTIAL—INTERNAL USE ONLY
Avamar
Backup/Recovery
Architecture
on premise off premise
Conventional
(Tape-centric)
Transformational
(Disk-centric)
Backup/Media
Manager
Onsite Backup
Storage
Disaster
Recovery
Storage
Application
Backup
Clients
Data Domain
NetWorker
Avamar
NetWorker DL Tape/DL
NetWorker Tape Tape
VM
8EMC CONFIDENTIAL—INTERNAL USE ONLY
EMC Avamar
 Integrated system for simple, predictable
results
 Global source-based deduplication
– Deduplicates across sites and servers globally
– Effective full backup every time
– Single-step recovery
– Backup process reduces data sent over the network
– Reduces virtual infrastructure stress
– Improves backup windows
• Integrated high availability and reliability
– RAIN for high availability and fault tolerance
– Avamar server and data recoverability verified daily
– Replication between servers
 Flexible deployment options
– Avamar Data Store
– Avamar Virtual Edition for VMware environments
Deduplication Backup Software & System
Avamar
VM
9EMC CONFIDENTIAL—INTERNAL USE ONLY
EMC Avamar Family
Core Platforms
Example Use CasesUnified
Management
Avamar
VM
EMC Data
Protection
Advisor
EMC
NetWorker
NAS/NDMPVMware Remote/Branch Offices
Clients
EMC Avamar
Software
EMC Avamar Virtual
Edition for VMware
EMC Avamar Data
Store
10EMC CONFIDENTIAL—INTERNAL USE ONLY
o VMware Inc. leverages several Avamar solutions to best meet their
needs
o VMware Corporate IT infrastructure is over 99% virtualized (over 400
VMs)
o Fast, daily full backup of 20TB, yet moving less than 1% of the data
o Median full backup time for each VM is under 8 minutes
o Utilizes existing ESX servers and physical / virtual infrastructure
o Fast, secure replication for disaster recovery
o Single step recovery and lower management costs
Success story: VMWare Inc.
11EMC CONFIDENTIAL—INTERNAL USE ONLY
Data Domain
Backup/Recovery
Architecture
on premise off premise
Conventional
(Tape-centric)
Transformational
(Disk-centric)
Backup/Media
Manager
Onsite Backup
Storage
Disaster
Recovery
Storage
Application
Backup
Clients
Data DomainOther 3rd Party
Avamar
Symantec
DL Tape/DL
NetWorker Tape Tape
VM
TSM
12EMC CONFIDENTIAL—INTERNAL USE ONLY
EMC Data Domain
 Advanced dedupe architecture for high speed & resilience
– Stream Informed Segment Layout (SISL) scaling architecture
– Data Invulnerability Architecture
 Scalable for Data Center and Distributed Recovery
– Up to 5.4 TB/hour per system
– Up to 3.5 PB logical capacity per system (50:1 Dedupe)
– Up to 71 TB usable capacity per system
 Broad Usage
– Tape minimization
– Distributed enterprise backup consolidation
– Cost-effective, long-term onsite retention and
Network-efficient replication for disaster recovery
 Deployment Flexibility and Seamless Integration
– Leading backup and archive applications
– All data types: structured and file
– All networks: NFS, CIFS, and OpenStorage via Ethernet, or
VTL via Fibre Channel
Deduplication storage systems
DDX Array
DD690
DD880
DD660
DD120
New
13EMC CONFIDENTIAL—INTERNAL USE ONLY
Data Domain Deduplication Storage
Easy integration makes a conventional environment transformational
Replication
CIFS, NFS,
NDMP, OpenStorage
Ethernet
VTL over FC
DD880 Appliance
Control Tier
Target Tier DR Tier
 4U
 2 - 6 ports
 10 and 1 Gb Ethernet; 4 Gb Fibre Channel
 RAID-6
 5.4 to 71 TB usable capacity with shelves
 1 TB or 500 GB 7.2k rpm SATA HDD in shelf
 File system
 NVRAM
 N+1 fans and redundant, hot-plug power supplies
DD880 Appliance
Backup & Archive
Applications
14EMC CONFIDENTIAL—INTERNAL USE ONLY
Industry’s Most Scalable Inline Dedupe Systems
DDX Array Series
OST, VTL, Replicator, & Retention Lock software options
Up to 16 Controllers
Internal or External Storage
DD140 DD610 DD630 DD565 DD660 DD690/g DD880/g DDX Array
Speed (GB/hr) 450 675 1.1 TB/hr 1.1 TB/hr 2 TB/hr 2.7 TB/hr 5.4 TB/hr 86.4 TB/hr
Logical Cap. (TB) 17-43 75-195 165-420 320-810 520-1.31 PB 710-1.7 PB 1.4-3.5 PB 22.6-56.7 PB
Raw Cap. (TB) 1.5 Up to 6 Up to 12 Up to 23.5 Up to 36 Up to 48 Up to 96 Up to 1.5 PB
Usable Cap. (TB) .86 Up to 3.98 Up to 8.4 Up to 16.2 Up to 26.1 Up to 35.3 Up to 71 Up to 1.13 PB
DD140
Remote Office Appliance
Gateway Series
DD690g
DD600 Appliance Series
New: DD630, DD610, and DD140 Systems
1TB Disk
DD880
DD610
DD630
15EMC CONFIDENTIAL—INTERNAL USE ONLY15
Fortune 1000 Customers
Technology
Telecom
Public Sector
Media/Entertainment
Healthcare
Industrial/Auto
Consumer/Retail
Financial Services
16EMC CONFIDENTIAL—INTERNAL USE ONLY
Central-European customers
17EMC CONFIDENTIAL—INTERNAL USE ONLY

More Related Content

What's hot

M. Rafaat_EMC_Presentation
M. Rafaat_EMC_PresentationM. Rafaat_EMC_Presentation
M. Rafaat_EMC_Presentation
Mohamed Raafat
 
OSS Presentation by Kevin Halgren
OSS Presentation by Kevin HalgrenOSS Presentation by Kevin Halgren
OSS Presentation by Kevin Halgren
OpenStorageSummit
 

What's hot (20)

M. Rafaat_EMC_Presentation
M. Rafaat_EMC_PresentationM. Rafaat_EMC_Presentation
M. Rafaat_EMC_Presentation
 
Implementing an NDMP backup solution using EMC NetWorker on IBM Storwize V700...
Implementing an NDMP backup solution using EMC NetWorker on IBM Storwize V700...Implementing an NDMP backup solution using EMC NetWorker on IBM Storwize V700...
Implementing an NDMP backup solution using EMC NetWorker on IBM Storwize V700...
 
Mega Launch Recap Slide Deck
Mega Launch Recap Slide DeckMega Launch Recap Slide Deck
Mega Launch Recap Slide Deck
 
Naprostá bezpečnost vašich dat díky jednoduchému, škálovatelnému, flexibilním...
Naprostá bezpečnost vašich dat díky jednoduchému, škálovatelnému, flexibilním...Naprostá bezpečnost vašich dat díky jednoduchému, škálovatelnému, flexibilním...
Naprostá bezpečnost vašich dat díky jednoduchému, škálovatelnému, flexibilním...
 
PernixData - A New Era of Server Side Storage
PernixData - A New Era of Server Side StoragePernixData - A New Era of Server Side Storage
PernixData - A New Era of Server Side Storage
 
Presentazione PernixData @ VMUGIT UserCon 2015
Presentazione PernixData @ VMUGIT UserCon 2015Presentazione PernixData @ VMUGIT UserCon 2015
Presentazione PernixData @ VMUGIT UserCon 2015
 
Offloading for Databases - Deep Dive
Offloading for Databases - Deep DiveOffloading for Databases - Deep Dive
Offloading for Databases - Deep Dive
 
Unitrends Overview 2012
Unitrends Overview 2012Unitrends Overview 2012
Unitrends Overview 2012
 
JetStor portfolio update final_2020-2021
JetStor portfolio update final_2020-2021JetStor portfolio update final_2020-2021
JetStor portfolio update final_2020-2021
 
FalconStor NSS Presentation
FalconStor NSS PresentationFalconStor NSS Presentation
FalconStor NSS Presentation
 
Vx Rack : L'hyperconvergence avec l'experience VCE
Vx Rack : L'hyperconvergence avec l'experience VCEVx Rack : L'hyperconvergence avec l'experience VCE
Vx Rack : L'hyperconvergence avec l'experience VCE
 
Enterprise class storage & san
Enterprise class storage & sanEnterprise class storage & san
Enterprise class storage & san
 
Time finder
Time finderTime finder
Time finder
 
Storage Area Networking: SAN Technology Update & Best Practice Deep Dive for ...
Storage Area Networking: SAN Technology Update & Best Practice Deep Dive for ...Storage Area Networking: SAN Technology Update & Best Practice Deep Dive for ...
Storage Area Networking: SAN Technology Update & Best Practice Deep Dive for ...
 
Presentation vmax hardware deep dive
Presentation   vmax hardware deep divePresentation   vmax hardware deep dive
Presentation vmax hardware deep dive
 
Building an open memory-centric computing architecture using intel optane
Building an open memory-centric computing architecture using intel optaneBuilding an open memory-centric computing architecture using intel optane
Building an open memory-centric computing architecture using intel optane
 
FAST VP Deep Dive
FAST VP Deep DiveFAST VP Deep Dive
FAST VP Deep Dive
 
IBM SAN Volume Controller Performance Analysis
IBM SAN Volume Controller Performance AnalysisIBM SAN Volume Controller Performance Analysis
IBM SAN Volume Controller Performance Analysis
 
Enterprise Storage NAS - Dual Controller
Enterprise Storage NAS - Dual ControllerEnterprise Storage NAS - Dual Controller
Enterprise Storage NAS - Dual Controller
 
OSS Presentation by Kevin Halgren
OSS Presentation by Kevin HalgrenOSS Presentation by Kevin Halgren
OSS Presentation by Kevin Halgren
 

Viewers also liked

Lesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery MethodsLesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery Methods
Gene Carboni
 

Viewers also liked (15)

Comparing Unitrends and EMC Avamar
Comparing Unitrends and EMC AvamarComparing Unitrends and EMC Avamar
Comparing Unitrends and EMC Avamar
 
Corporate Laptop Backup and Recovery
Corporate Laptop Backup and RecoveryCorporate Laptop Backup and Recovery
Corporate Laptop Backup and Recovery
 
Presentation backup and recovery best practices for very large databases (v...
Presentation   backup and recovery best practices for very large databases (v...Presentation   backup and recovery best practices for very large databases (v...
Presentation backup and recovery best practices for very large databases (v...
 
Recovery and backup for beginners
Recovery and backup for beginnersRecovery and backup for beginners
Recovery and backup for beginners
 
Aspirus Enterprise Backup Assessment And Implementation Of Avamar
Aspirus Enterprise Backup Assessment And Implementation Of AvamarAspirus Enterprise Backup Assessment And Implementation Of Avamar
Aspirus Enterprise Backup Assessment And Implementation Of Avamar
 
Data backup and disaster recovery
Data backup and disaster recoveryData backup and disaster recovery
Data backup and disaster recovery
 
Exadata Backup
Exadata BackupExadata Backup
Exadata Backup
 
Les 06 Perform Rec
Les 06 Perform RecLes 06 Perform Rec
Les 06 Perform Rec
 
Lesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery MethodsLesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery Methods
 
Backup and recovery in oracle
Backup and recovery in oracleBackup and recovery in oracle
Backup and recovery in oracle
 
Backup And Recovery
Backup And RecoveryBackup And Recovery
Backup And Recovery
 
Services Marketing
Services MarketingServices Marketing
Services Marketing
 
26 Time Management Hacks I Wish I'd Known at 20
26 Time Management Hacks I Wish I'd Known at 2026 Time Management Hacks I Wish I'd Known at 20
26 Time Management Hacks I Wish I'd Known at 20
 
Technology powerpoint presentations
Technology powerpoint presentationsTechnology powerpoint presentations
Technology powerpoint presentations
 
4 Critical Elements of Your Onboarding Process
4 Critical Elements of Your Onboarding Process4 Critical Elements of Your Onboarding Process
4 Critical Elements of Your Onboarding Process
 

Similar to 2009-dec02_EMC2

Avamar Presentatie Q3 2010
Avamar Presentatie Q3 2010Avamar Presentatie Q3 2010
Avamar Presentatie Q3 2010
Jo Verstappen
 
NetBackup Appliance Family presentation
NetBackup Appliance Family presentationNetBackup Appliance Family presentation
NetBackup Appliance Family presentation
Symantec
 
Fujitsu - 27mai2011
Fujitsu - 27mai2011Fujitsu - 27mai2011
Fujitsu - 27mai2011
Agora Group
 

Similar to 2009-dec02_EMC2 (20)

Avamar 7 2010
Avamar 7 2010Avamar 7 2010
Avamar 7 2010
 
Avamar-7_2010.ppt
Avamar-7_2010.pptAvamar-7_2010.ppt
Avamar-7_2010.ppt
 
EMC Vmax3 tech-deck deep dive
EMC Vmax3 tech-deck deep diveEMC Vmax3 tech-deck deep dive
EMC Vmax3 tech-deck deep dive
 
Emc vnx2 technical deep dive workshop
Emc vnx2 technical deep dive workshopEmc vnx2 technical deep dive workshop
Emc vnx2 technical deep dive workshop
 
Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...
Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...
Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...
 
Avamar Presentatie Q3 2010
Avamar Presentatie Q3 2010Avamar Presentatie Q3 2010
Avamar Presentatie Q3 2010
 
Presentation deduplication backup software and system
Presentation   deduplication backup software and systemPresentation   deduplication backup software and system
Presentation deduplication backup software and system
 
NetBackup Appliance Family presentation
NetBackup Appliance Family presentationNetBackup Appliance Family presentation
NetBackup Appliance Family presentation
 
Emc data domain
Emc data domainEmc data domain
Emc data domain
 
EMC VNX
EMC VNXEMC VNX
EMC VNX
 
Cisco Live
Cisco LiveCisco Live
Cisco Live
 
Emc vspex customer_presentation_private_cloud_virtualized_share_point
Emc vspex customer_presentation_private_cloud_virtualized_share_pointEmc vspex customer_presentation_private_cloud_virtualized_share_point
Emc vspex customer_presentation_private_cloud_virtualized_share_point
 
Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...
Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...
Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...
 
Dlm ppt
Dlm pptDlm ppt
Dlm ppt
 
The Best Storage For V Mware Environments Customer Presentation Jul201
The Best Storage For V Mware Environments Customer Presentation Jul201The Best Storage For V Mware Environments Customer Presentation Jul201
The Best Storage For V Mware Environments Customer Presentation Jul201
 
EMCSymmetrix vmax-10
EMCSymmetrix vmax-10EMCSymmetrix vmax-10
EMCSymmetrix vmax-10
 
Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...
Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...
Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...
 
Webinar NETGEAR - ACRONIS e NETGEAR: Demo di soluzione DR per l'Azienda - pa...
Webinar NETGEAR -  ACRONIS e NETGEAR: Demo di soluzione DR per l'Azienda - pa...Webinar NETGEAR -  ACRONIS e NETGEAR: Demo di soluzione DR per l'Azienda - pa...
Webinar NETGEAR - ACRONIS e NETGEAR: Demo di soluzione DR per l'Azienda - pa...
 
MT41 Dell EMC VMAX: Ask the Experts
MT41 Dell EMC VMAX: Ask the Experts MT41 Dell EMC VMAX: Ask the Experts
MT41 Dell EMC VMAX: Ask the Experts
 
Fujitsu - 27mai2011
Fujitsu - 27mai2011Fujitsu - 27mai2011
Fujitsu - 27mai2011
 

More from Agora Group

Curs Digital Forensics
Curs Digital ForensicsCurs Digital Forensics
Curs Digital Forensics
Agora Group
 
Class IT - Enemy inside the wire
Class IT - Enemy inside the wireClass IT - Enemy inside the wire
Class IT - Enemy inside the wire
Agora Group
 
Infologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileInfologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobile
Agora Group
 
Agora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Securitate yugo neumorni
Agora Securitate yugo neumorni
Agora Group
 
Security threats in the LAN
Security threats in the LANSecurity threats in the LAN
Security threats in the LAN
Agora Group
 

More from Agora Group (20)

How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
 
Microservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseMicroservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe procese
 
The role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftThe role of BPM in Paradigms Shift
The role of BPM in Paradigms Shift
 
Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004
 
Curs OSINT
Curs OSINTCurs OSINT
Curs OSINT
 
Curs Digital Forensics
Curs Digital ForensicsCurs Digital Forensics
Curs Digital Forensics
 
The next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMThe next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPM
 
Speed Dialing the Enterprise
Speed Dialing the EnterpriseSpeed Dialing the Enterprise
Speed Dialing the Enterprise
 
ABPMP Romania
ABPMP RomaniaABPMP Romania
ABPMP Romania
 
Arhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateArhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de Sănătate
 
IBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessIBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent Business
 
eHealth 2014_Radu Dop
eHealth 2014_Radu DopeHealth 2014_Radu Dop
eHealth 2014_Radu Dop
 
Importanța registrelor pentru pacienți
Importanța registrelor pentru paciențiImportanța registrelor pentru pacienți
Importanța registrelor pentru pacienți
 
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
 
Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...
 
UTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateUTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatate
 
Class IT - Enemy inside the wire
Class IT - Enemy inside the wireClass IT - Enemy inside the wire
Class IT - Enemy inside the wire
 
Infologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileInfologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobile
 
Agora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Securitate yugo neumorni
Agora Securitate yugo neumorni
 
Security threats in the LAN
Security threats in the LANSecurity threats in the LAN
Security threats in the LAN
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

2009-dec02_EMC2

  • 1. 1EMC CONFIDENTIAL—INTERNAL USE ONLY Data Domain, Avamar Dumitru Taraianu – Presales, EMC SEE Backup & Recovery
  • 2. 2EMC CONFIDENTIAL—INTERNAL USE ONLY Back-up to Disk: Capacity = €€€€€€€ Primary Data 1x Back-up Data 15x-20x
  • 3. 3EMC CONFIDENTIAL—INTERNAL USE ONLY Backup Is Evolving Backup/Recovery Architecture on premise off premise Conventional (Tape-centric) Transformational (Disk-centric) Backup/Media Manager Onsite Backup Storage Disaster Recovery Storage Application Backup Clients Deduplication storageBackup Software Deduplication backup software and system Backup Software VTL VTL Backup Software VTL Tape Backup Software Tape Tape VM
  • 4. 4EMC CONFIDENTIAL—INTERNAL USE ONLY EMC Backup Restore Systems Backup/Recovery Architecture on premise off premise Conventional (Tape-centric) Transformational (Disk-centric) Backup/Media Manager Onsite Backup Storage Disaster Recovery Storage Application Backup Clients Data DomainNetWorker Avamar NetWorker Disk Libr Disk Libr NetWorker Disk Libr Tape NetWorker Tape Tape VM
  • 5. 5EMC CONFIDENTIAL—INTERNAL USE ONLY EMC BRS Market Position  Avamar – #1 deduplication backup software worldwide – 4,500 installations – 2,500 customers  Data Domain – #1 deduplication storage worldwide – 9,500 installations – 3,500 customers  Disk Library – #1 VTL worldwide – >$1B Sales  NetWorker – Top three enterprise backup – 30,000 customers
  • 6. 6EMC CONFIDENTIAL—INTERNAL USE ONLY Structured Data EMC Backup & Archive Portfolio NetWorker Unstructured Data Virtualized Servers App OS App OS ESX Server Avamar Data Domain / Disk Library Data Protection Advisor Avamar VM 2TB Industries 1st Virtual Backup Server
  • 7. 7EMC CONFIDENTIAL—INTERNAL USE ONLY Avamar Backup/Recovery Architecture on premise off premise Conventional (Tape-centric) Transformational (Disk-centric) Backup/Media Manager Onsite Backup Storage Disaster Recovery Storage Application Backup Clients Data Domain NetWorker Avamar NetWorker DL Tape/DL NetWorker Tape Tape VM
  • 8. 8EMC CONFIDENTIAL—INTERNAL USE ONLY EMC Avamar  Integrated system for simple, predictable results  Global source-based deduplication – Deduplicates across sites and servers globally – Effective full backup every time – Single-step recovery – Backup process reduces data sent over the network – Reduces virtual infrastructure stress – Improves backup windows • Integrated high availability and reliability – RAIN for high availability and fault tolerance – Avamar server and data recoverability verified daily – Replication between servers  Flexible deployment options – Avamar Data Store – Avamar Virtual Edition for VMware environments Deduplication Backup Software & System Avamar VM
  • 9. 9EMC CONFIDENTIAL—INTERNAL USE ONLY EMC Avamar Family Core Platforms Example Use CasesUnified Management Avamar VM EMC Data Protection Advisor EMC NetWorker NAS/NDMPVMware Remote/Branch Offices Clients EMC Avamar Software EMC Avamar Virtual Edition for VMware EMC Avamar Data Store
  • 10. 10EMC CONFIDENTIAL—INTERNAL USE ONLY o VMware Inc. leverages several Avamar solutions to best meet their needs o VMware Corporate IT infrastructure is over 99% virtualized (over 400 VMs) o Fast, daily full backup of 20TB, yet moving less than 1% of the data o Median full backup time for each VM is under 8 minutes o Utilizes existing ESX servers and physical / virtual infrastructure o Fast, secure replication for disaster recovery o Single step recovery and lower management costs Success story: VMWare Inc.
  • 11. 11EMC CONFIDENTIAL—INTERNAL USE ONLY Data Domain Backup/Recovery Architecture on premise off premise Conventional (Tape-centric) Transformational (Disk-centric) Backup/Media Manager Onsite Backup Storage Disaster Recovery Storage Application Backup Clients Data DomainOther 3rd Party Avamar Symantec DL Tape/DL NetWorker Tape Tape VM TSM
  • 12. 12EMC CONFIDENTIAL—INTERNAL USE ONLY EMC Data Domain  Advanced dedupe architecture for high speed & resilience – Stream Informed Segment Layout (SISL) scaling architecture – Data Invulnerability Architecture  Scalable for Data Center and Distributed Recovery – Up to 5.4 TB/hour per system – Up to 3.5 PB logical capacity per system (50:1 Dedupe) – Up to 71 TB usable capacity per system  Broad Usage – Tape minimization – Distributed enterprise backup consolidation – Cost-effective, long-term onsite retention and Network-efficient replication for disaster recovery  Deployment Flexibility and Seamless Integration – Leading backup and archive applications – All data types: structured and file – All networks: NFS, CIFS, and OpenStorage via Ethernet, or VTL via Fibre Channel Deduplication storage systems DDX Array DD690 DD880 DD660 DD120 New
  • 13. 13EMC CONFIDENTIAL—INTERNAL USE ONLY Data Domain Deduplication Storage Easy integration makes a conventional environment transformational Replication CIFS, NFS, NDMP, OpenStorage Ethernet VTL over FC DD880 Appliance Control Tier Target Tier DR Tier  4U  2 - 6 ports  10 and 1 Gb Ethernet; 4 Gb Fibre Channel  RAID-6  5.4 to 71 TB usable capacity with shelves  1 TB or 500 GB 7.2k rpm SATA HDD in shelf  File system  NVRAM  N+1 fans and redundant, hot-plug power supplies DD880 Appliance Backup & Archive Applications
  • 14. 14EMC CONFIDENTIAL—INTERNAL USE ONLY Industry’s Most Scalable Inline Dedupe Systems DDX Array Series OST, VTL, Replicator, & Retention Lock software options Up to 16 Controllers Internal or External Storage DD140 DD610 DD630 DD565 DD660 DD690/g DD880/g DDX Array Speed (GB/hr) 450 675 1.1 TB/hr 1.1 TB/hr 2 TB/hr 2.7 TB/hr 5.4 TB/hr 86.4 TB/hr Logical Cap. (TB) 17-43 75-195 165-420 320-810 520-1.31 PB 710-1.7 PB 1.4-3.5 PB 22.6-56.7 PB Raw Cap. (TB) 1.5 Up to 6 Up to 12 Up to 23.5 Up to 36 Up to 48 Up to 96 Up to 1.5 PB Usable Cap. (TB) .86 Up to 3.98 Up to 8.4 Up to 16.2 Up to 26.1 Up to 35.3 Up to 71 Up to 1.13 PB DD140 Remote Office Appliance Gateway Series DD690g DD600 Appliance Series New: DD630, DD610, and DD140 Systems 1TB Disk DD880 DD610 DD630
  • 15. 15EMC CONFIDENTIAL—INTERNAL USE ONLY15 Fortune 1000 Customers Technology Telecom Public Sector Media/Entertainment Healthcare Industrial/Auto Consumer/Retail Financial Services
  • 16. 16EMC CONFIDENTIAL—INTERNAL USE ONLY Central-European customers