SlideShare una empresa de Scribd logo
1 de 27
© 2017 Unitrends 1#1
All-in-One Enterprise
Backup and Continuity
Backup to Continuity to
Productivity
Mark Jordan, VP Technology
May 17, 2017
© 2017 Unitrends 2
 What is copy data management?
 Why is it important?
 Streamline data-intensive reporting and compliance tasks
 Make your IT, DevOps, and application teams more productive
 Other cool stuff
 Win a $500 Amazon gift card
Key Takeaways
© 2017 Unitrends 3
“Copy data is created when primary
data is copied for secondary purposes,
including data protection, operations,
test/dev, and analytics.”
© 2017 Unitrends 4
According to IDC, up to 60%
of storage capacity is
dedicated to copy data today
and it will cost business over
$50B in 2018.
© 2017 Unitrends 5
 Do you have RPOs/RTOs?
 Do you test them?
 Do you have compliance
requirements?
 Do you need to quickly spin up
environments for dev/test/DevOps?
CD
M
© 2017 Unitrends 6
Development
 Test/Dev
 Continuous integration
 Quality assurance
 Training
Operations
 Sandbox
 Patch management
 Optimization and tuning
 Pre-production simulation
Data Analytics
 Reporting
 Business intelligence
 Analytics
Data Protection
 Backup
 DR copies
 Logical corruption protection
© 2017 Unitrends 7
A recent study shows
that 82% of
businesses have at
least 10 copies of any
one production
instance of data
© 2017 Unitrends 8
A recent study shows
that 82% of
businesses have at
least 10 copies of any
one production
instance of data
$50B in 2018
© 2017 Unitrends 9
What if you could
use backup data to
accomplish your
copy data
management
needs?
© 2017 Unitrends 10
What it does? Provides enterprise IT and DevOps instant access to production
data, applications, and full labs for test, dev, compliance, and other
business functions with no impact to the production environment
Productivity: Automated Provisioning (Copy Data
Management)
How does it work? • Uses backup data (i.e. reduces production copies)
• Orchestrates instant recovery of on-demand labs
• Isolates labs from production
• Controls lab access to key stakeholders
• Supports physical and virtual environments
• Requires Enterprise Plus
Customer benefits? “Other teams (e.g. DevOps, app development) can test their
application updates and run compute intensive reports without
waiting for labs to be ready or the cost of additional storage
infrastructure.”
© 2017 Unitrends 11
Data
integrity
checks
Mount a
database
Screenshot
verification
N-Tier
application
analytics
Examples
© 2017 Unitrends 12
Boot order sequencing
for N-tier applications
What automation technology is required?
© 2017 Unitrends 13
Application-specific
integrity verification
What automation technology is required?
*Not a complete list!
© 2017 Unitrends 14
Network automation to isolate from production
 Virtual network assignment
 Network remodeling
 Re-IP
What automation technology is required?
© 2017 Unitrends 15
Compliance reporting for
business stakeholders
What automation technology is required?
© 2017 Unitrends 16
 Dashboard widget
 Compliance Report
 Recovery Assurance Report
 Live Job Progress
 Job History
 Email Reports
CDM Core Reporting Tools
© 2017 Unitrends 17
Protect Secure Test Detect Recover
New!
Often
ignored
!
Over-
looked!
© 2017 Unitrends 18
What it does? Controls the initiation and flow of backups and backup copies
through a single, simple policy
Protect: SLA Policy Automation
How does it work? • Simply set RPO, retention and location of backups/copies
• Unitrends software automates underlying process
• We then analyze regularly if you’re meeting your SLAs
• The product automates business-level reports for compliance
SME customer benefits “Unitrends just made setup, scheduling and backup management
60% simpler. I never actually knew what my RPOs and RTOs
were until now.”
Enterprise customer
benefits
“In just one-step, I’m setup and compliant with my business
requirements, including external demands from HIPPA and SOX.
That’s real simplicity and confidence.”
© 2017 Unitrends 19
© 2017 Unitrends 20
Secure: The New World Approach
Hardened, Linux Backup
Appliances
vs.
Targeted, Susceptible Windows
Software
© 2017 Unitrends 21
Compliance reporting for
business stakeholders
Test: Automated Provisioning and Recovery
Assurance
© 2017 Unitrends 22
• Uses adaptive &
predictive analytics
against backup data
 Designed to search for
ransomware threat
conditions
 Proactive alerts are sent
when ransomware
conditions are detected
Detect: Proactive Ransomware Detection
© 2017 Unitrends 23
© 2017 Unitrends 24
Backup Magic
Quadrant
DRaaS Magic
Quadrant
ITRO Market
Guide
Unitrends is adapting faster than any other vendor
Unitrends is the only solution recognized in all three major Gartner publications
© 2017 Unitrends 25
+Unitrends
@Unitrends
@Unitrends
@Unitrends
+Unitrends
@UnitrendsInc
© 2017 Unitrends 26
http://pages.Unitrends.com/tech-demo
Register today.
One lucky
attendee will win a
$500 Amazon Gift
Card.
7 Ways Backup Makes IT More Productive

Más contenido relacionado

La actualidad más candente

Tirez pleinement parti d'Elastic grâce à Elastic Cloud
Tirez pleinement parti d'Elastic grâce à Elastic CloudTirez pleinement parti d'Elastic grâce à Elastic Cloud
Tirez pleinement parti d'Elastic grâce à Elastic CloudElasticsearch
 
Combating the IT Monsters That Keep You Up at Night
Combating the IT Monsters That Keep You Up at NightCombating the IT Monsters That Keep You Up at Night
Combating the IT Monsters That Keep You Up at Nightmarketingunitrends
 
DOG Meetup 18 November 2021 - Factry
DOG Meetup 18 November 2021 - FactryDOG Meetup 18 November 2021 - Factry
DOG Meetup 18 November 2021 - FactryDataops Ghent Meetup
 
EtQ Reliance: Solution for Enterprise Compliance Management
EtQ Reliance: Solution for Enterprise Compliance ManagementEtQ Reliance: Solution for Enterprise Compliance Management
EtQ Reliance: Solution for Enterprise Compliance ManagementEtQ, Inc.
 
10 Good Reasons: NetApp OnCommand Insight
10 Good Reasons: NetApp OnCommand Insight10 Good Reasons: NetApp OnCommand Insight
10 Good Reasons: NetApp OnCommand InsightNetApp
 
Next Generation Managed Services KOX
Next Generation Managed Services KOXNext Generation Managed Services KOX
Next Generation Managed Services KOXJose A. Abril
 
Cisco Connected Factory - Security
Cisco Connected Factory - SecurityCisco Connected Factory - Security
Cisco Connected Factory - SecurityConnected Futures
 
The Benefits of Flash Storage for Virtualized Environments
The Benefits of Flash Storage for Virtualized EnvironmentsThe Benefits of Flash Storage for Virtualized Environments
The Benefits of Flash Storage for Virtualized EnvironmentsNetApp
 
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...Precisely
 
Accelerating Secure SAP Application Delivery
Accelerating Secure SAP Application Delivery Accelerating Secure SAP Application Delivery
Accelerating Secure SAP Application Delivery Delphix
 
Why Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenterWhy Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenterTegile Systems
 
5 Key Benefits of a Unified Data Center
5 Key Benefits of a Unified Data Center5 Key Benefits of a Unified Data Center
5 Key Benefits of a Unified Data CenterePlus
 
Jim Dean Marketing One Pager
Jim Dean Marketing One PagerJim Dean Marketing One Pager
Jim Dean Marketing One PagerJames Dean
 
Higher Efficiency and IT Empowerment with VMware vSphere with Operations Mana...
Higher Efficiency and IT Empowerment with VMware vSphere with Operations Mana...Higher Efficiency and IT Empowerment with VMware vSphere with Operations Mana...
Higher Efficiency and IT Empowerment with VMware vSphere with Operations Mana...VMware
 
Reducing Shadow IT by embracing “good enough for HIPAA” horizontal cloud solu...
Reducing Shadow IT by embracing “good enough for HIPAA” horizontal cloud solu...Reducing Shadow IT by embracing “good enough for HIPAA” horizontal cloud solu...
Reducing Shadow IT by embracing “good enough for HIPAA” horizontal cloud solu...Shahid Shah
 
HIF Paris 2014 - Bénéficiez de la puissance des solutions HDS et Symantec, au...
HIF Paris 2014 - Bénéficiez de la puissance des solutions HDS et Symantec, au...HIF Paris 2014 - Bénéficiez de la puissance des solutions HDS et Symantec, au...
HIF Paris 2014 - Bénéficiez de la puissance des solutions HDS et Symantec, au...Hitachi Data Systems France
 
Open Architecture: The Key to Aviation Security
Open Architecture: The Key to Aviation SecurityOpen Architecture: The Key to Aviation Security
Open Architecture: The Key to Aviation Securityagoldsmith1
 
New Model for IT: Cloud Service Provider
New Model for IT: Cloud Service ProviderNew Model for IT: Cloud Service Provider
New Model for IT: Cloud Service ProviderVMware
 

La actualidad más candente (20)

Tirez pleinement parti d'Elastic grâce à Elastic Cloud
Tirez pleinement parti d'Elastic grâce à Elastic CloudTirez pleinement parti d'Elastic grâce à Elastic Cloud
Tirez pleinement parti d'Elastic grâce à Elastic Cloud
 
Combating the IT Monsters That Keep You Up at Night
Combating the IT Monsters That Keep You Up at NightCombating the IT Monsters That Keep You Up at Night
Combating the IT Monsters That Keep You Up at Night
 
DOG Meetup 18 November 2021 - Factry
DOG Meetup 18 November 2021 - FactryDOG Meetup 18 November 2021 - Factry
DOG Meetup 18 November 2021 - Factry
 
Chrome Summary
Chrome SummaryChrome Summary
Chrome Summary
 
EtQ Reliance: Solution for Enterprise Compliance Management
EtQ Reliance: Solution for Enterprise Compliance ManagementEtQ Reliance: Solution for Enterprise Compliance Management
EtQ Reliance: Solution for Enterprise Compliance Management
 
10 Good Reasons: NetApp OnCommand Insight
10 Good Reasons: NetApp OnCommand Insight10 Good Reasons: NetApp OnCommand Insight
10 Good Reasons: NetApp OnCommand Insight
 
Next Generation Managed Services KOX
Next Generation Managed Services KOXNext Generation Managed Services KOX
Next Generation Managed Services KOX
 
Cisco Connected Factory - Security
Cisco Connected Factory - SecurityCisco Connected Factory - Security
Cisco Connected Factory - Security
 
DCNCBC
DCNCBCDCNCBC
DCNCBC
 
The Benefits of Flash Storage for Virtualized Environments
The Benefits of Flash Storage for Virtualized EnvironmentsThe Benefits of Flash Storage for Virtualized Environments
The Benefits of Flash Storage for Virtualized Environments
 
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...
 
Accelerating Secure SAP Application Delivery
Accelerating Secure SAP Application Delivery Accelerating Secure SAP Application Delivery
Accelerating Secure SAP Application Delivery
 
Why Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenterWhy Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenter
 
5 Key Benefits of a Unified Data Center
5 Key Benefits of a Unified Data Center5 Key Benefits of a Unified Data Center
5 Key Benefits of a Unified Data Center
 
Jim Dean Marketing One Pager
Jim Dean Marketing One PagerJim Dean Marketing One Pager
Jim Dean Marketing One Pager
 
Higher Efficiency and IT Empowerment with VMware vSphere with Operations Mana...
Higher Efficiency and IT Empowerment with VMware vSphere with Operations Mana...Higher Efficiency and IT Empowerment with VMware vSphere with Operations Mana...
Higher Efficiency and IT Empowerment with VMware vSphere with Operations Mana...
 
Reducing Shadow IT by embracing “good enough for HIPAA” horizontal cloud solu...
Reducing Shadow IT by embracing “good enough for HIPAA” horizontal cloud solu...Reducing Shadow IT by embracing “good enough for HIPAA” horizontal cloud solu...
Reducing Shadow IT by embracing “good enough for HIPAA” horizontal cloud solu...
 
HIF Paris 2014 - Bénéficiez de la puissance des solutions HDS et Symantec, au...
HIF Paris 2014 - Bénéficiez de la puissance des solutions HDS et Symantec, au...HIF Paris 2014 - Bénéficiez de la puissance des solutions HDS et Symantec, au...
HIF Paris 2014 - Bénéficiez de la puissance des solutions HDS et Symantec, au...
 
Open Architecture: The Key to Aviation Security
Open Architecture: The Key to Aviation SecurityOpen Architecture: The Key to Aviation Security
Open Architecture: The Key to Aviation Security
 
New Model for IT: Cloud Service Provider
New Model for IT: Cloud Service ProviderNew Model for IT: Cloud Service Provider
New Model for IT: Cloud Service Provider
 

Similar a 7 Ways Backup Makes IT More Productive

Ibm itsm portfolio
Ibm itsm portfolioIbm itsm portfolio
Ibm itsm portfolioDetlef Wolf
 
Data Is Evolving. Shouldn’t Your Backup Architecture?
Data Is Evolving. Shouldn’t Your Backup Architecture?Data Is Evolving. Shouldn’t Your Backup Architecture?
Data Is Evolving. Shouldn’t Your Backup Architecture?marketingunitrends
 
Gartner EA Architecting for DevOps and Hybrid Cloud
Gartner EA Architecting for DevOps and Hybrid CloudGartner EA Architecting for DevOps and Hybrid Cloud
Gartner EA Architecting for DevOps and Hybrid CloudRosalind Radcliffe
 
Office 365 Monitoring Best Practices
Office 365 Monitoring Best PracticesOffice 365 Monitoring Best Practices
Office 365 Monitoring Best PracticesThousandEyes
 
DataOps , cbuswaw April '23
DataOps , cbuswaw April '23DataOps , cbuswaw April '23
DataOps , cbuswaw April '23Jason Packer
 
iThome Cloud Summit 2017 - 實戰 Hybrid Cloud 管理與安全技術
iThome Cloud Summit 2017 - 實戰 Hybrid Cloud 管理與安全技術 iThome Cloud Summit 2017 - 實戰 Hybrid Cloud 管理與安全技術
iThome Cloud Summit 2017 - 實戰 Hybrid Cloud 管理與安全技術 WAN-HSUAN KUNG
 
Mendix Essentials Presentatie Gerolf Roovers26/08/2011
Mendix Essentials Presentatie Gerolf Roovers26/08/2011Mendix Essentials Presentatie Gerolf Roovers26/08/2011
Mendix Essentials Presentatie Gerolf Roovers26/08/2011Mendix
 
A Detailed Guide To DataOps
A Detailed Guide To DataOpsA Detailed Guide To DataOps
A Detailed Guide To DataOpsEnov8
 
5 Steps to Achieving the Single Pane of Glass Across DevOps -- APM, NPM, Metr...
5 Steps to Achieving the Single Pane of Glass Across DevOps -- APM, NPM, Metr...5 Steps to Achieving the Single Pane of Glass Across DevOps -- APM, NPM, Metr...
5 Steps to Achieving the Single Pane of Glass Across DevOps -- APM, NPM, Metr...DevOps.com
 
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdfDACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdfDNUG e.V.
 
Big Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on DataBig Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on DataMatt Stubbs
 
Big Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on DataBig Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on DataMatt Stubbs
 
The new dominant companies are running on data
The new dominant companies are running on data The new dominant companies are running on data
The new dominant companies are running on data SnapLogic
 
Why Infrastructure Matters for Big Data & Analytics
Why Infrastructure Matters for Big Data & AnalyticsWhy Infrastructure Matters for Big Data & Analytics
Why Infrastructure Matters for Big Data & AnalyticsRick Perret
 
EMA Presentation: Driving Business Value with Continuous Operational Intellig...
EMA Presentation: Driving Business Value with Continuous Operational Intellig...EMA Presentation: Driving Business Value with Continuous Operational Intellig...
EMA Presentation: Driving Business Value with Continuous Operational Intellig...ExtraHop Networks
 
Postgres Vision 2018: Making Modern an Old Legacy System
Postgres Vision 2018: Making Modern an Old Legacy SystemPostgres Vision 2018: Making Modern an Old Legacy System
Postgres Vision 2018: Making Modern an Old Legacy SystemEDB
 
How Dealertrack Optimizes the DevOps Toolchain, FutureStack17
How Dealertrack Optimizes the DevOps Toolchain, FutureStack17How Dealertrack Optimizes the DevOps Toolchain, FutureStack17
How Dealertrack Optimizes the DevOps Toolchain, FutureStack17New Relic
 
HyperconvergedFantasyAnalytics
HyperconvergedFantasyAnalyticsHyperconvergedFantasyAnalytics
HyperconvergedFantasyAnalyticsJerry Jermann
 
Neev Application Performance Management Services
Neev Application Performance Management ServicesNeev Application Performance Management Services
Neev Application Performance Management ServicesNeev Technologies
 

Similar a 7 Ways Backup Makes IT More Productive (20)

How Businesses use Big Data to Impact the Bottom Line
How Businesses use Big Data to Impact the Bottom LineHow Businesses use Big Data to Impact the Bottom Line
How Businesses use Big Data to Impact the Bottom Line
 
Ibm itsm portfolio
Ibm itsm portfolioIbm itsm portfolio
Ibm itsm portfolio
 
Data Is Evolving. Shouldn’t Your Backup Architecture?
Data Is Evolving. Shouldn’t Your Backup Architecture?Data Is Evolving. Shouldn’t Your Backup Architecture?
Data Is Evolving. Shouldn’t Your Backup Architecture?
 
Gartner EA Architecting for DevOps and Hybrid Cloud
Gartner EA Architecting for DevOps and Hybrid CloudGartner EA Architecting for DevOps and Hybrid Cloud
Gartner EA Architecting for DevOps and Hybrid Cloud
 
Office 365 Monitoring Best Practices
Office 365 Monitoring Best PracticesOffice 365 Monitoring Best Practices
Office 365 Monitoring Best Practices
 
DataOps , cbuswaw April '23
DataOps , cbuswaw April '23DataOps , cbuswaw April '23
DataOps , cbuswaw April '23
 
iThome Cloud Summit 2017 - 實戰 Hybrid Cloud 管理與安全技術
iThome Cloud Summit 2017 - 實戰 Hybrid Cloud 管理與安全技術 iThome Cloud Summit 2017 - 實戰 Hybrid Cloud 管理與安全技術
iThome Cloud Summit 2017 - 實戰 Hybrid Cloud 管理與安全技術
 
Mendix Essentials Presentatie Gerolf Roovers26/08/2011
Mendix Essentials Presentatie Gerolf Roovers26/08/2011Mendix Essentials Presentatie Gerolf Roovers26/08/2011
Mendix Essentials Presentatie Gerolf Roovers26/08/2011
 
A Detailed Guide To DataOps
A Detailed Guide To DataOpsA Detailed Guide To DataOps
A Detailed Guide To DataOps
 
5 Steps to Achieving the Single Pane of Glass Across DevOps -- APM, NPM, Metr...
5 Steps to Achieving the Single Pane of Glass Across DevOps -- APM, NPM, Metr...5 Steps to Achieving the Single Pane of Glass Across DevOps -- APM, NPM, Metr...
5 Steps to Achieving the Single Pane of Glass Across DevOps -- APM, NPM, Metr...
 
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdfDACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
 
Big Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on DataBig Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on Data
 
Big Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on DataBig Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on Data
 
The new dominant companies are running on data
The new dominant companies are running on data The new dominant companies are running on data
The new dominant companies are running on data
 
Why Infrastructure Matters for Big Data & Analytics
Why Infrastructure Matters for Big Data & AnalyticsWhy Infrastructure Matters for Big Data & Analytics
Why Infrastructure Matters for Big Data & Analytics
 
EMA Presentation: Driving Business Value with Continuous Operational Intellig...
EMA Presentation: Driving Business Value with Continuous Operational Intellig...EMA Presentation: Driving Business Value with Continuous Operational Intellig...
EMA Presentation: Driving Business Value with Continuous Operational Intellig...
 
Postgres Vision 2018: Making Modern an Old Legacy System
Postgres Vision 2018: Making Modern an Old Legacy SystemPostgres Vision 2018: Making Modern an Old Legacy System
Postgres Vision 2018: Making Modern an Old Legacy System
 
How Dealertrack Optimizes the DevOps Toolchain, FutureStack17
How Dealertrack Optimizes the DevOps Toolchain, FutureStack17How Dealertrack Optimizes the DevOps Toolchain, FutureStack17
How Dealertrack Optimizes the DevOps Toolchain, FutureStack17
 
HyperconvergedFantasyAnalytics
HyperconvergedFantasyAnalyticsHyperconvergedFantasyAnalytics
HyperconvergedFantasyAnalytics
 
Neev Application Performance Management Services
Neev Application Performance Management ServicesNeev Application Performance Management Services
Neev Application Performance Management Services
 

Más de marketingunitrends

Ransomware Detection: Don’t Pay Up. Backup.
Ransomware Detection:  Don’t Pay Up. Backup.Ransomware Detection:  Don’t Pay Up. Backup.
Ransomware Detection: Don’t Pay Up. Backup.marketingunitrends
 
Your Greatest Threats Come from Within
Your Greatest Threats Come from WithinYour Greatest Threats Come from Within
Your Greatest Threats Come from Withinmarketingunitrends
 
8 Things You Need to Know About DRaaS
8 Things You Need to Know About DRaaS8 Things You Need to Know About DRaaS
8 Things You Need to Know About DRaaSmarketingunitrends
 
3 Ways to Take the Disaster Out of Cloud DR
3 Ways to Take the Disaster Out of Cloud DR3 Ways to Take the Disaster Out of Cloud DR
3 Ways to Take the Disaster Out of Cloud DRmarketingunitrends
 
Will Your Recovery SLA Become a Broken Promise?
Will Your Recovery SLA Become a Broken Promise?Will Your Recovery SLA Become a Broken Promise?
Will Your Recovery SLA Become a Broken Promise?marketingunitrends
 
How to Choose the Right Cloud for Continuity
How to Choose the Right Cloud for ContinuityHow to Choose the Right Cloud for Continuity
How to Choose the Right Cloud for Continuitymarketingunitrends
 
Is Your Use of Windows Backup Opening the Door to Hackers?
Is Your Use of Windows Backup Opening the Door to Hackers?Is Your Use of Windows Backup Opening the Door to Hackers?
Is Your Use of Windows Backup Opening the Door to Hackers?marketingunitrends
 
Designing a Bad A$$ Backup Target without Breaking the Bank
Designing a Bad A$$ Backup Target without Breaking the BankDesigning a Bad A$$ Backup Target without Breaking the Bank
Designing a Bad A$$ Backup Target without Breaking the Bankmarketingunitrends
 
Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?marketingunitrends
 
Death, Taxes and Backup Vendor Finger Pointing
Death, Taxes and Backup Vendor Finger PointingDeath, Taxes and Backup Vendor Finger Pointing
Death, Taxes and Backup Vendor Finger Pointingmarketingunitrends
 
Tech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of RansomwareTech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of Ransomwaremarketingunitrends
 
What’s the “Secret Sauce” for Protecting SSD Storage?
What’s the “Secret Sauce” for Protecting SSD Storage?What’s the “Secret Sauce” for Protecting SSD Storage?
What’s the “Secret Sauce” for Protecting SSD Storage?marketingunitrends
 
All Workloads Matter! Can You Protect Everything?
All Workloads Matter! Can You Protect Everything?All Workloads Matter! Can You Protect Everything?
All Workloads Matter! Can You Protect Everything?marketingunitrends
 
The 7 New Rules of Recovery Webinar
The 7 New Rules of Recovery WebinarThe 7 New Rules of Recovery Webinar
The 7 New Rules of Recovery Webinarmarketingunitrends
 
Don’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud
Don’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for CloudDon’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud
Don’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloudmarketingunitrends
 
Haunted by Your Backup Renewal: 4 Questions to Ask First
Haunted by Your Backup Renewal: 4 Questions to Ask First Haunted by Your Backup Renewal: 4 Questions to Ask First
Haunted by Your Backup Renewal: 4 Questions to Ask First marketingunitrends
 
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...marketingunitrends
 
5 Must Haves in an Integrated Backup Appliance
5 Must Haves in an Integrated Backup Appliance5 Must Haves in an Integrated Backup Appliance
5 Must Haves in an Integrated Backup Appliancemarketingunitrends
 
Microsoft Azure & Continuity: 5 Use Cases and Success Factors
Microsoft Azure & Continuity: 5 Use Cases and Success FactorsMicrosoft Azure & Continuity: 5 Use Cases and Success Factors
Microsoft Azure & Continuity: 5 Use Cases and Success Factorsmarketingunitrends
 
How to Take the Ransom Out of Ransomware
How to Take the Ransom Out of RansomwareHow to Take the Ransom Out of Ransomware
How to Take the Ransom Out of Ransomwaremarketingunitrends
 

Más de marketingunitrends (20)

Ransomware Detection: Don’t Pay Up. Backup.
Ransomware Detection:  Don’t Pay Up. Backup.Ransomware Detection:  Don’t Pay Up. Backup.
Ransomware Detection: Don’t Pay Up. Backup.
 
Your Greatest Threats Come from Within
Your Greatest Threats Come from WithinYour Greatest Threats Come from Within
Your Greatest Threats Come from Within
 
8 Things You Need to Know About DRaaS
8 Things You Need to Know About DRaaS8 Things You Need to Know About DRaaS
8 Things You Need to Know About DRaaS
 
3 Ways to Take the Disaster Out of Cloud DR
3 Ways to Take the Disaster Out of Cloud DR3 Ways to Take the Disaster Out of Cloud DR
3 Ways to Take the Disaster Out of Cloud DR
 
Will Your Recovery SLA Become a Broken Promise?
Will Your Recovery SLA Become a Broken Promise?Will Your Recovery SLA Become a Broken Promise?
Will Your Recovery SLA Become a Broken Promise?
 
How to Choose the Right Cloud for Continuity
How to Choose the Right Cloud for ContinuityHow to Choose the Right Cloud for Continuity
How to Choose the Right Cloud for Continuity
 
Is Your Use of Windows Backup Opening the Door to Hackers?
Is Your Use of Windows Backup Opening the Door to Hackers?Is Your Use of Windows Backup Opening the Door to Hackers?
Is Your Use of Windows Backup Opening the Door to Hackers?
 
Designing a Bad A$$ Backup Target without Breaking the Bank
Designing a Bad A$$ Backup Target without Breaking the BankDesigning a Bad A$$ Backup Target without Breaking the Bank
Designing a Bad A$$ Backup Target without Breaking the Bank
 
Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?
 
Death, Taxes and Backup Vendor Finger Pointing
Death, Taxes and Backup Vendor Finger PointingDeath, Taxes and Backup Vendor Finger Pointing
Death, Taxes and Backup Vendor Finger Pointing
 
Tech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of RansomwareTech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of Ransomware
 
What’s the “Secret Sauce” for Protecting SSD Storage?
What’s the “Secret Sauce” for Protecting SSD Storage?What’s the “Secret Sauce” for Protecting SSD Storage?
What’s the “Secret Sauce” for Protecting SSD Storage?
 
All Workloads Matter! Can You Protect Everything?
All Workloads Matter! Can You Protect Everything?All Workloads Matter! Can You Protect Everything?
All Workloads Matter! Can You Protect Everything?
 
The 7 New Rules of Recovery Webinar
The 7 New Rules of Recovery WebinarThe 7 New Rules of Recovery Webinar
The 7 New Rules of Recovery Webinar
 
Don’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud
Don’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for CloudDon’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud
Don’t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud
 
Haunted by Your Backup Renewal: 4 Questions to Ask First
Haunted by Your Backup Renewal: 4 Questions to Ask First Haunted by Your Backup Renewal: 4 Questions to Ask First
Haunted by Your Backup Renewal: 4 Questions to Ask First
 
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...
 
5 Must Haves in an Integrated Backup Appliance
5 Must Haves in an Integrated Backup Appliance5 Must Haves in an Integrated Backup Appliance
5 Must Haves in an Integrated Backup Appliance
 
Microsoft Azure & Continuity: 5 Use Cases and Success Factors
Microsoft Azure & Continuity: 5 Use Cases and Success FactorsMicrosoft Azure & Continuity: 5 Use Cases and Success Factors
Microsoft Azure & Continuity: 5 Use Cases and Success Factors
 
How to Take the Ransom Out of Ransomware
How to Take the Ransom Out of RansomwareHow to Take the Ransom Out of Ransomware
How to Take the Ransom Out of Ransomware
 

Último

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

7 Ways Backup Makes IT More Productive

  • 1. © 2017 Unitrends 1#1 All-in-One Enterprise Backup and Continuity Backup to Continuity to Productivity Mark Jordan, VP Technology May 17, 2017
  • 2. © 2017 Unitrends 2  What is copy data management?  Why is it important?  Streamline data-intensive reporting and compliance tasks  Make your IT, DevOps, and application teams more productive  Other cool stuff  Win a $500 Amazon gift card Key Takeaways
  • 3. © 2017 Unitrends 3 “Copy data is created when primary data is copied for secondary purposes, including data protection, operations, test/dev, and analytics.”
  • 4. © 2017 Unitrends 4 According to IDC, up to 60% of storage capacity is dedicated to copy data today and it will cost business over $50B in 2018.
  • 5. © 2017 Unitrends 5  Do you have RPOs/RTOs?  Do you test them?  Do you have compliance requirements?  Do you need to quickly spin up environments for dev/test/DevOps? CD M
  • 6. © 2017 Unitrends 6 Development  Test/Dev  Continuous integration  Quality assurance  Training Operations  Sandbox  Patch management  Optimization and tuning  Pre-production simulation Data Analytics  Reporting  Business intelligence  Analytics Data Protection  Backup  DR copies  Logical corruption protection
  • 7. © 2017 Unitrends 7 A recent study shows that 82% of businesses have at least 10 copies of any one production instance of data
  • 8. © 2017 Unitrends 8 A recent study shows that 82% of businesses have at least 10 copies of any one production instance of data $50B in 2018
  • 9. © 2017 Unitrends 9 What if you could use backup data to accomplish your copy data management needs?
  • 10. © 2017 Unitrends 10 What it does? Provides enterprise IT and DevOps instant access to production data, applications, and full labs for test, dev, compliance, and other business functions with no impact to the production environment Productivity: Automated Provisioning (Copy Data Management) How does it work? • Uses backup data (i.e. reduces production copies) • Orchestrates instant recovery of on-demand labs • Isolates labs from production • Controls lab access to key stakeholders • Supports physical and virtual environments • Requires Enterprise Plus Customer benefits? “Other teams (e.g. DevOps, app development) can test their application updates and run compute intensive reports without waiting for labs to be ready or the cost of additional storage infrastructure.”
  • 11. © 2017 Unitrends 11 Data integrity checks Mount a database Screenshot verification N-Tier application analytics Examples
  • 12. © 2017 Unitrends 12 Boot order sequencing for N-tier applications What automation technology is required?
  • 13. © 2017 Unitrends 13 Application-specific integrity verification What automation technology is required? *Not a complete list!
  • 14. © 2017 Unitrends 14 Network automation to isolate from production  Virtual network assignment  Network remodeling  Re-IP What automation technology is required?
  • 15. © 2017 Unitrends 15 Compliance reporting for business stakeholders What automation technology is required?
  • 16. © 2017 Unitrends 16  Dashboard widget  Compliance Report  Recovery Assurance Report  Live Job Progress  Job History  Email Reports CDM Core Reporting Tools
  • 17. © 2017 Unitrends 17 Protect Secure Test Detect Recover New! Often ignored ! Over- looked!
  • 18. © 2017 Unitrends 18 What it does? Controls the initiation and flow of backups and backup copies through a single, simple policy Protect: SLA Policy Automation How does it work? • Simply set RPO, retention and location of backups/copies • Unitrends software automates underlying process • We then analyze regularly if you’re meeting your SLAs • The product automates business-level reports for compliance SME customer benefits “Unitrends just made setup, scheduling and backup management 60% simpler. I never actually knew what my RPOs and RTOs were until now.” Enterprise customer benefits “In just one-step, I’m setup and compliant with my business requirements, including external demands from HIPPA and SOX. That’s real simplicity and confidence.”
  • 20. © 2017 Unitrends 20 Secure: The New World Approach Hardened, Linux Backup Appliances vs. Targeted, Susceptible Windows Software
  • 21. © 2017 Unitrends 21 Compliance reporting for business stakeholders Test: Automated Provisioning and Recovery Assurance
  • 22. © 2017 Unitrends 22 • Uses adaptive & predictive analytics against backup data  Designed to search for ransomware threat conditions  Proactive alerts are sent when ransomware conditions are detected Detect: Proactive Ransomware Detection
  • 24. © 2017 Unitrends 24 Backup Magic Quadrant DRaaS Magic Quadrant ITRO Market Guide Unitrends is adapting faster than any other vendor Unitrends is the only solution recognized in all three major Gartner publications
  • 25. © 2017 Unitrends 25 +Unitrends @Unitrends @Unitrends @Unitrends +Unitrends @UnitrendsInc
  • 26. © 2017 Unitrends 26 http://pages.Unitrends.com/tech-demo Register today. One lucky attendee will win a $500 Amazon Gift Card.

Notas del editor

  1. You’re not resilient unless the complete application works for the end users.
  2. Using functionality from Unitrends to display some of this
  3. Backup solutions can play a bigger part in your anti-ransomware strategy than you might have thought Some of these steps are covered by most solutions However, you’ll see some of the best solutions out there handling all of these in a unique way and I highlighted those in blue
  4. Ransomware targets Windows predominantly Many folks that were hit by ransomware had their backups impacted as well This is because many incumbent backup solutions are also Windows based The new approach is a hardened, locked down, purpose-built backup appliance (often one that is a hybrid cloud appliance)
  5. Backup vendors have access to a lot of information that can be put to use
  6. Ensure your solution can instantly recovery full VMs, physical machines, files and folders