SlideShare una empresa de Scribd logo
1 de 31
Descargar para leer sin conexión
CommVault Introduction
Mark Bell
mbell@commvault.com
07788 818 589
Level Set
What do Commvault do?










Backup & Recovery
Archive
Virtualization
Deduplication
Replication
Content Indexing
Snapshots
Database Protection

 Edge Data Protection
 Cloud Storage
 Storage Resource
Management
 Encryption
 eDiscovery
 Storage Infrastructure
 Retention
So why is Commvault so different?

 Data Protection
 Data Management
 Information Management

What are your customers looking for now?
CommVault Intro SureSkills Simpana 10 Event 2013
CommVault Intro SureSkills Simpana 10 Event 2013
CommVault Intro SureSkills Simpana 10 Event 2013
CommVault Intro SureSkills Simpana 10 Event 2013
CommVault Intro SureSkills Simpana 10 Event 2013
CommVault Intro SureSkills Simpana 10 Event 2013
CommVault Intro SureSkills Simpana 10 Event 2013
CommVault Intro SureSkills Simpana 10 Event 2013
I want it

NOW!!
I want it

NOW!!
CommVault Intro SureSkills Simpana 10 Event 2013
CommVault Intro SureSkills Simpana 10 Event 2013
CommVault Intro SureSkills Simpana 10 Event 2013
The Legacy Approach
Point/Silo Approach to Data Management

Windows Protection

Search

VM Protection

Archive

Storage Resource
Management

Deduplication

HSM

Snapshot
Management

Reporting

Remote Backup

Database Protection

UNIX Protection

Replication
Infrastructure Silos
Operational Inefficiency
“Over-Protection” and Bloat
Legacy Portfolio
Coverage
Your customers?
Symantec
Backup &
Recovery

Archive, Email,
Files, eDiscovery
& Compliance
Data Reduction
Deduplication &
Compression

Enterprise
Reporting

CA Technology

IBM

EMC
Networker

NetBackup

D2D

HomeBase

TSM for SharePoint

Centera

Commo
n Store
Princeton Softech

Enterprise
Vault

Xtenders

SourceOne

PureDisk

Command Central

SRM
Control Center

Replication,
Management,
& CDP
Desktop /
Laptop

Replication Exec™
Recover
Point Replistor

NOT AVAILABLE

DPA

Repl.
Manager
The Simpana® Way
CommVault
Singular Information Management®

Data Center Backup VM Protection

SRM

Snap Mgmt

Database Protection

Archive

Reporting

Remote Backup

Replication

Search

Dedupe
Single Platform for Data & Info Management
Extensible and Adaptable

APPLICATIONS

DATABASES

MESSAGING

FILE SYSTEMS

EDGE

AUTOMATE

MANAGE

Data Management

Business Insight

 Protection Copies

 Reduce Complexity

 Archive Copies

 Reduce Sprawl

 Snapshot Copies

 Increase Data
Governance

 Many Devices

 Reduce cost

 Many Locations

 Increase Efficiency
& Agility

 Intelligent Index

 Mitigate Risk

RECOVER

RETAIN

DISCOVER

REPORT

ACCESS

DISPOSE

EMPOWER
CommVault’s Mission and Background
Solely dedicated to enterprise data and information
management

Simpana® Software provides truly integrated data
management and protection

Modern Data and Information Management
enables companies to efficiently capture, move, retain, find
and recover data from any storage tier

Our customers reduce cost, improve operational
efficiency and derive business value from their
stored data
Market Proven
FY13 Results
Enterprise Disk Backup Magic Quadrant
CommVault is positioned as a Leader in Gartner’s Magic
Quadrant for Enterprise Backup/ Recovery Software for the
third consecutive year
• This Magic Quadrant graphic was published by
Gartner, Inc. as part of a larger research note and
should be evaluated in the context of the entire report.
• The Gartner report is available upon request from
CommVault.
• The Magic Quadrant is copyrighted by Gartner, Inc.
and is reused with permission.
• The Magic Quadrant is a graphical representation of a
marketplace at and for a specific time period.
• It depicts Gartner’s analysis of how certain vendors
measure against criteria for that marketplace, as
defined by Gartner.
• Gartner does not endorse any vendor, product or
service depicted in the Magic Quadrant, and does not
advise technology users to select only those vendors
placed in the “Leaders” quadrant.
• The Magic Quadrant is intended solely as a research
tool, and is not meant to be a specific guide to action.
Gartner disclaims all warranties, express or implied,
with respect to this research, including any warranties
of merchantability or fitness for a particular purpose.

Source: Magic Quadrant for Enterprise Backup/ Recovery Software; by David Russell, Sheila
Childs, Pushan Rinnen; June 5, 2013

© 2013 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered
trademark of Gartner, Inc. or its affiliates. For more information, e-mail info@gartner.com
or visit gartner.com. Used with permission.
A Single Platform for Data & Info Management
Extensible & Adaptable

Backup and Recovery

Deduplication

Self-Service Access

Snapshot Management

Intelligent Archive

Regulatory & Compliance

Virtual Server Protection

Storage Tiering

Content Indexing for Search

Simpana OnePass™ Technology

Workflow

CommVault Edge™ Technology

Edge Data Protection

Reporting, Trending, & Analytics

Data Insight
Simpana® Software
Extensible and Exhaustive Data Management

Commvault’s Simpana software for data
protection and information management
helps organizations manage data
growth, cut costs and reduce risk by
simplifying data management functions
through a single, unified platform and
architecture.
Simpana® Software
Extensible and Exhaustive Data Management

What can we help you with?

Más contenido relacionado

La actualidad más candente

Comprehensive and Simplified Management for VMware vSphere Environments - now...
Comprehensive and Simplified Management for VMware vSphere Environments - now...Comprehensive and Simplified Management for VMware vSphere Environments - now...
Comprehensive and Simplified Management for VMware vSphere Environments - now...Hitachi Vantara
 
CommVault - Your Journey to A Secure Cloud Event
CommVault - Your Journey to A Secure Cloud EventCommVault - Your Journey to A Secure Cloud Event
CommVault - Your Journey to A Secure Cloud EventGoogle
 
Delivering Modern Data Protection for VMware Environments
Delivering Modern Data Protection for VMware EnvironmentsDelivering Modern Data Protection for VMware Environments
Delivering Modern Data Protection for VMware EnvironmentsPaula Koziol
 
Software-Defined Storage
Software-Defined StorageSoftware-Defined Storage
Software-Defined StorageNetApp
 
'Software-Defined Everything' Includes Storage and Data
'Software-Defined Everything' Includes Storage and Data'Software-Defined Everything' Includes Storage and Data
'Software-Defined Everything' Includes Storage and DataPrimaryData
 
HDS Influencer Summit 2014: Innovating with Information to Address Business N...
HDS Influencer Summit 2014: Innovating with Information to Address Business N...HDS Influencer Summit 2014: Innovating with Information to Address Business N...
HDS Influencer Summit 2014: Innovating with Information to Address Business N...Hitachi Vantara
 
Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021Karel Kannel
 
Big Data – Shining the Light on Enterprise Dark Data
Big Data – Shining the Light on Enterprise Dark DataBig Data – Shining the Light on Enterprise Dark Data
Big Data – Shining the Light on Enterprise Dark DataHitachi Vantara
 
Unlock Real Value from Back Up Data with IBM Spectrum Protect Plus
Unlock Real Value from Back Up Data with IBM Spectrum Protect PlusUnlock Real Value from Back Up Data with IBM Spectrum Protect Plus
Unlock Real Value from Back Up Data with IBM Spectrum Protect PlusPaula Koziol
 
Software-Defined Storage (SDS)
Software-Defined Storage (SDS)Software-Defined Storage (SDS)
Software-Defined Storage (SDS)Ali Mirfallah
 
DATASHEET▶ Enterprise Cloud Backup & Recovery with Symantec NetBackup
DATASHEET▶ Enterprise Cloud Backup & Recovery with Symantec NetBackupDATASHEET▶ Enterprise Cloud Backup & Recovery with Symantec NetBackup
DATASHEET▶ Enterprise Cloud Backup & Recovery with Symantec NetBackupSymantec
 
Webinar: How To Use Software Defined Storage to Extend Your SAN, Not Replace it
Webinar: How To Use Software Defined Storage to Extend Your SAN, Not Replace itWebinar: How To Use Software Defined Storage to Extend Your SAN, Not Replace it
Webinar: How To Use Software Defined Storage to Extend Your SAN, Not Replace itStorage Switzerland
 
Accelerate the Business Value of Enterprise Storage
Accelerate the Business Value of Enterprise StorageAccelerate the Business Value of Enterprise Storage
Accelerate the Business Value of Enterprise StorageHitachi Vantara
 
Dynamic Data Centers - Taking it to the next level
Dynamic Data Centers - Taking it to the next levelDynamic Data Centers - Taking it to the next level
Dynamic Data Centers - Taking it to the next levelsanvmibj
 
Object Storage 3: How to Use and Develop Applications Designed for Object Sto...
Object Storage 3: How to Use and Develop Applications Designed for Object Sto...Object Storage 3: How to Use and Develop Applications Designed for Object Sto...
Object Storage 3: How to Use and Develop Applications Designed for Object Sto...Hitachi Vantara
 
IBM Storage for SAP HANA Deployments
IBM Storage for SAP HANA DeploymentsIBM Storage for SAP HANA Deployments
IBM Storage for SAP HANA DeploymentsPaula Koziol
 
Software Defined presentation
Software Defined presentationSoftware Defined presentation
Software Defined presentationJohn Rhodes
 
Maximize IT for Real Business Advantage
Maximize IT for Real Business AdvantageMaximize IT for Real Business Advantage
Maximize IT for Real Business AdvantageHitachi Vantara
 
RTO < 15min for 1TB Oracle DB - Actifio replaces Oracle Data Guard
RTO < 15min for 1TB Oracle DB - Actifio replaces Oracle Data GuardRTO < 15min for 1TB Oracle DB - Actifio replaces Oracle Data Guard
RTO < 15min for 1TB Oracle DB - Actifio replaces Oracle Data GuardMarcel Pils
 

La actualidad más candente (20)

Comprehensive and Simplified Management for VMware vSphere Environments - now...
Comprehensive and Simplified Management for VMware vSphere Environments - now...Comprehensive and Simplified Management for VMware vSphere Environments - now...
Comprehensive and Simplified Management for VMware vSphere Environments - now...
 
CommVault - Your Journey to A Secure Cloud Event
CommVault - Your Journey to A Secure Cloud EventCommVault - Your Journey to A Secure Cloud Event
CommVault - Your Journey to A Secure Cloud Event
 
Delivering Modern Data Protection for VMware Environments
Delivering Modern Data Protection for VMware EnvironmentsDelivering Modern Data Protection for VMware Environments
Delivering Modern Data Protection for VMware Environments
 
Software-Defined Storage
Software-Defined StorageSoftware-Defined Storage
Software-Defined Storage
 
'Software-Defined Everything' Includes Storage and Data
'Software-Defined Everything' Includes Storage and Data'Software-Defined Everything' Includes Storage and Data
'Software-Defined Everything' Includes Storage and Data
 
HDS Influencer Summit 2014: Innovating with Information to Address Business N...
HDS Influencer Summit 2014: Innovating with Information to Address Business N...HDS Influencer Summit 2014: Innovating with Information to Address Business N...
HDS Influencer Summit 2014: Innovating with Information to Address Business N...
 
Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021
 
Big Data – Shining the Light on Enterprise Dark Data
Big Data – Shining the Light on Enterprise Dark DataBig Data – Shining the Light on Enterprise Dark Data
Big Data – Shining the Light on Enterprise Dark Data
 
Unlock Real Value from Back Up Data with IBM Spectrum Protect Plus
Unlock Real Value from Back Up Data with IBM Spectrum Protect PlusUnlock Real Value from Back Up Data with IBM Spectrum Protect Plus
Unlock Real Value from Back Up Data with IBM Spectrum Protect Plus
 
Software-Defined Storage (SDS)
Software-Defined Storage (SDS)Software-Defined Storage (SDS)
Software-Defined Storage (SDS)
 
DATASHEET▶ Enterprise Cloud Backup & Recovery with Symantec NetBackup
DATASHEET▶ Enterprise Cloud Backup & Recovery with Symantec NetBackupDATASHEET▶ Enterprise Cloud Backup & Recovery with Symantec NetBackup
DATASHEET▶ Enterprise Cloud Backup & Recovery with Symantec NetBackup
 
141106 actifio overview
141106 actifio overview 141106 actifio overview
141106 actifio overview
 
Webinar: How To Use Software Defined Storage to Extend Your SAN, Not Replace it
Webinar: How To Use Software Defined Storage to Extend Your SAN, Not Replace itWebinar: How To Use Software Defined Storage to Extend Your SAN, Not Replace it
Webinar: How To Use Software Defined Storage to Extend Your SAN, Not Replace it
 
Accelerate the Business Value of Enterprise Storage
Accelerate the Business Value of Enterprise StorageAccelerate the Business Value of Enterprise Storage
Accelerate the Business Value of Enterprise Storage
 
Dynamic Data Centers - Taking it to the next level
Dynamic Data Centers - Taking it to the next levelDynamic Data Centers - Taking it to the next level
Dynamic Data Centers - Taking it to the next level
 
Object Storage 3: How to Use and Develop Applications Designed for Object Sto...
Object Storage 3: How to Use and Develop Applications Designed for Object Sto...Object Storage 3: How to Use and Develop Applications Designed for Object Sto...
Object Storage 3: How to Use and Develop Applications Designed for Object Sto...
 
IBM Storage for SAP HANA Deployments
IBM Storage for SAP HANA DeploymentsIBM Storage for SAP HANA Deployments
IBM Storage for SAP HANA Deployments
 
Software Defined presentation
Software Defined presentationSoftware Defined presentation
Software Defined presentation
 
Maximize IT for Real Business Advantage
Maximize IT for Real Business AdvantageMaximize IT for Real Business Advantage
Maximize IT for Real Business Advantage
 
RTO < 15min for 1TB Oracle DB - Actifio replaces Oracle Data Guard
RTO < 15min for 1TB Oracle DB - Actifio replaces Oracle Data GuardRTO < 15min for 1TB Oracle DB - Actifio replaces Oracle Data Guard
RTO < 15min for 1TB Oracle DB - Actifio replaces Oracle Data Guard
 

Destacado

Automating Backup & Archiving with AWS and CommVault
Automating Backup & Archiving with AWS and CommVaultAutomating Backup & Archiving with AWS and CommVault
Automating Backup & Archiving with AWS and CommVaultAmazon Web Services
 
Scalar, nimble, brocade, commvault, star trek into darkness, toronto, 05 16 2013
Scalar, nimble, brocade, commvault, star trek into darkness, toronto, 05 16 2013Scalar, nimble, brocade, commvault, star trek into darkness, toronto, 05 16 2013
Scalar, nimble, brocade, commvault, star trek into darkness, toronto, 05 16 2013patmisasi
 
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...Proact Netherlands B.V.
 
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large InstallationsTECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large InstallationsSymantec
 
The Business Value of Commvault Software IDC 2016 US40773815
The Business Value of Commvault Software IDC 2016 US40773815The Business Value of Commvault Software IDC 2016 US40773815
The Business Value of Commvault Software IDC 2016 US40773815Charles Uprichard
 
AWS Public Sector Symposium 2014 Canberra | Powering a Hybrid Cloud with Comm...
AWS Public Sector Symposium 2014 Canberra | Powering a Hybrid Cloud with Comm...AWS Public Sector Symposium 2014 Canberra | Powering a Hybrid Cloud with Comm...
AWS Public Sector Symposium 2014 Canberra | Powering a Hybrid Cloud with Comm...Amazon Web Services
 
UST Global increased data center capacity
UST Global increased data center capacityUST Global increased data center capacity
UST Global increased data center capacityDell India
 
Ethernet Alliance Tech Exploration Forum Keynote
Ethernet Alliance Tech Exploration Forum KeynoteEthernet Alliance Tech Exploration Forum Keynote
Ethernet Alliance Tech Exploration Forum Keynotebkoley
 
Gssa datacenter solutions
Gssa datacenter solutionsGssa datacenter solutions
Gssa datacenter solutionsGss America
 
vCenter Operations 5: Level 300 training
vCenter Operations 5: Level 300 trainingvCenter Operations 5: Level 300 training
vCenter Operations 5: Level 300 trainingEric Sloof
 
Better Data Center Infrastructure Management
Better Data Center Infrastructure ManagementBetter Data Center Infrastructure Management
Better Data Center Infrastructure ManagementViridity Software
 
Intel- Next Generation Datacenters & Cloud
Intel- Next Generation Datacenters & CloudIntel- Next Generation Datacenters & Cloud
Intel- Next Generation Datacenters & Clouditnewsafrica
 
DC architectures future proof
DC architectures future proofDC architectures future proof
DC architectures future proofGuido Frabotti
 

Destacado (15)

Automating Backup & Archiving with AWS and CommVault
Automating Backup & Archiving with AWS and CommVaultAutomating Backup & Archiving with AWS and CommVault
Automating Backup & Archiving with AWS and CommVault
 
Scalar, nimble, brocade, commvault, star trek into darkness, toronto, 05 16 2013
Scalar, nimble, brocade, commvault, star trek into darkness, toronto, 05 16 2013Scalar, nimble, brocade, commvault, star trek into darkness, toronto, 05 16 2013
Scalar, nimble, brocade, commvault, star trek into darkness, toronto, 05 16 2013
 
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
 
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large InstallationsTECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations
 
The Business Value of Commvault Software IDC 2016 US40773815
The Business Value of Commvault Software IDC 2016 US40773815The Business Value of Commvault Software IDC 2016 US40773815
The Business Value of Commvault Software IDC 2016 US40773815
 
AWS Public Sector Symposium 2014 Canberra | Powering a Hybrid Cloud with Comm...
AWS Public Sector Symposium 2014 Canberra | Powering a Hybrid Cloud with Comm...AWS Public Sector Symposium 2014 Canberra | Powering a Hybrid Cloud with Comm...
AWS Public Sector Symposium 2014 Canberra | Powering a Hybrid Cloud with Comm...
 
UST Global increased data center capacity
UST Global increased data center capacityUST Global increased data center capacity
UST Global increased data center capacity
 
Ethernet Alliance Tech Exploration Forum Keynote
Ethernet Alliance Tech Exploration Forum KeynoteEthernet Alliance Tech Exploration Forum Keynote
Ethernet Alliance Tech Exploration Forum Keynote
 
Gssa datacenter solutions
Gssa datacenter solutionsGssa datacenter solutions
Gssa datacenter solutions
 
vCenter Operations 5: Level 300 training
vCenter Operations 5: Level 300 trainingvCenter Operations 5: Level 300 training
vCenter Operations 5: Level 300 training
 
Better Data Center Infrastructure Management
Better Data Center Infrastructure ManagementBetter Data Center Infrastructure Management
Better Data Center Infrastructure Management
 
Unix Administration 2
Unix Administration 2Unix Administration 2
Unix Administration 2
 
Intel- Next Generation Datacenters & Cloud
Intel- Next Generation Datacenters & CloudIntel- Next Generation Datacenters & Cloud
Intel- Next Generation Datacenters & Cloud
 
Hp ux x_server
Hp ux x_serverHp ux x_server
Hp ux x_server
 
DC architectures future proof
DC architectures future proofDC architectures future proof
DC architectures future proof
 

Similar a CommVault Intro SureSkills Simpana 10 Event 2013

AWS Summit Sydney 2014 | Powering a Hybrid Cloud with CommVault and Amazon We...
AWS Summit Sydney 2014 | Powering a Hybrid Cloud with CommVault and Amazon We...AWS Summit Sydney 2014 | Powering a Hybrid Cloud with CommVault and Amazon We...
AWS Summit Sydney 2014 | Powering a Hybrid Cloud with CommVault and Amazon We...Amazon Web Services
 
Commvault - Il Dato è tratto - 09.11.2017
Commvault - Il Dato è tratto - 09.11.2017Commvault - Il Dato è tratto - 09.11.2017
Commvault - Il Dato è tratto - 09.11.2017Eurosystem S.p.A.
 
DataVard SAPPHIRE Presentation - Canary Code (TM)
DataVard SAPPHIRE Presentation - Canary Code (TM)DataVard SAPPHIRE Presentation - Canary Code (TM)
DataVard SAPPHIRE Presentation - Canary Code (TM)Mike Nelson
 
Teradata Aster: Big Data Discovery Made Easy
Teradata Aster: Big Data Discovery Made EasyTeradata Aster: Big Data Discovery Made Easy
Teradata Aster: Big Data Discovery Made EasyTIBCO Spotfire
 
Investor Presentation Q4 2014
Investor Presentation Q4 2014Investor Presentation Q4 2014
Investor Presentation Q4 2014teradata2014
 
The Edge of Disaster Recovery - May Events Presentation FINAL
The Edge of Disaster Recovery - May Events Presentation FINALThe Edge of Disaster Recovery - May Events Presentation FINAL
The Edge of Disaster Recovery - May Events Presentation FINALJohn Baumgarten
 
Powerup performance of Informatica Environment Nov 5, 2015
Powerup performance of Informatica Environment Nov 5, 2015Powerup performance of Informatica Environment Nov 5, 2015
Powerup performance of Informatica Environment Nov 5, 2015Wise Men
 
SolarWinds Federal Partner Perfstack Training
SolarWinds Federal Partner Perfstack TrainingSolarWinds Federal Partner Perfstack Training
SolarWinds Federal Partner Perfstack TrainingSolarWinds
 
Discussing strategies for building the next gen data centre
Discussing strategies for building the next gen data centreDiscussing strategies for building the next gen data centre
Discussing strategies for building the next gen data centreICT-Partners
 
Investor presentation q2 2014
Investor presentation q2 2014Investor presentation q2 2014
Investor presentation q2 2014teradata2014
 
System z Mainframe Data with Amazon S3 and Amazon Glacier (ENT107) | AWS re:I...
System z Mainframe Data with Amazon S3 and Amazon Glacier (ENT107) | AWS re:I...System z Mainframe Data with Amazon S3 and Amazon Glacier (ENT107) | AWS re:I...
System z Mainframe Data with Amazon S3 and Amazon Glacier (ENT107) | AWS re:I...Amazon Web Services
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloudtcarrucan
 
Maximizing Business Value: Optimizing Technology Investment
Maximizing Business Value: Optimizing Technology InvestmentMaximizing Business Value: Optimizing Technology Investment
Maximizing Business Value: Optimizing Technology InvestmentTeradata
 
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage Costs
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage CostsWebinar: 3 Steps to be a Storage Superhero - How to Slash Storage Costs
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage CostsStorage Switzerland
 
De voordelen van hypervisor en back-up integratie
De voordelen van hypervisor en back-up integratie De voordelen van hypervisor en back-up integratie
De voordelen van hypervisor en back-up integratie Proact Netherlands B.V.
 
Aen004 Thorpe 091807
Aen004 Thorpe 091807Aen004 Thorpe 091807
Aen004 Thorpe 091807Dreamforce07
 
Teradata Investor Presentation
Teradata Investor Presentation Teradata Investor Presentation
Teradata Investor Presentation teradata2014
 

Similar a CommVault Intro SureSkills Simpana 10 Event 2013 (20)

AWS Summit Sydney 2014 | Powering a Hybrid Cloud with CommVault and Amazon We...
AWS Summit Sydney 2014 | Powering a Hybrid Cloud with CommVault and Amazon We...AWS Summit Sydney 2014 | Powering a Hybrid Cloud with CommVault and Amazon We...
AWS Summit Sydney 2014 | Powering a Hybrid Cloud with CommVault and Amazon We...
 
Presentatie CommVault Dyon de Bruyne
Presentatie CommVault   Dyon de BruynePresentatie CommVault   Dyon de Bruyne
Presentatie CommVault Dyon de Bruyne
 
Commvault - Il Dato è tratto - 09.11.2017
Commvault - Il Dato è tratto - 09.11.2017Commvault - Il Dato è tratto - 09.11.2017
Commvault - Il Dato è tratto - 09.11.2017
 
Ampi vmware
Ampi vmwareAmpi vmware
Ampi vmware
 
DataVard SAPPHIRE Presentation - Canary Code (TM)
DataVard SAPPHIRE Presentation - Canary Code (TM)DataVard SAPPHIRE Presentation - Canary Code (TM)
DataVard SAPPHIRE Presentation - Canary Code (TM)
 
Teradata Aster: Big Data Discovery Made Easy
Teradata Aster: Big Data Discovery Made EasyTeradata Aster: Big Data Discovery Made Easy
Teradata Aster: Big Data Discovery Made Easy
 
Investor Presentation Q4 2014
Investor Presentation Q4 2014Investor Presentation Q4 2014
Investor Presentation Q4 2014
 
The Edge of Disaster Recovery - May Events Presentation FINAL
The Edge of Disaster Recovery - May Events Presentation FINALThe Edge of Disaster Recovery - May Events Presentation FINAL
The Edge of Disaster Recovery - May Events Presentation FINAL
 
Powerup performance of Informatica Environment Nov 5, 2015
Powerup performance of Informatica Environment Nov 5, 2015Powerup performance of Informatica Environment Nov 5, 2015
Powerup performance of Informatica Environment Nov 5, 2015
 
SolarWinds Federal Partner Perfstack Training
SolarWinds Federal Partner Perfstack TrainingSolarWinds Federal Partner Perfstack Training
SolarWinds Federal Partner Perfstack Training
 
Discussing strategies for building the next gen data centre
Discussing strategies for building the next gen data centreDiscussing strategies for building the next gen data centre
Discussing strategies for building the next gen data centre
 
Investor presentation q2 2014
Investor presentation q2 2014Investor presentation q2 2014
Investor presentation q2 2014
 
System z Mainframe Data with Amazon S3 and Amazon Glacier (ENT107) | AWS re:I...
System z Mainframe Data with Amazon S3 and Amazon Glacier (ENT107) | AWS re:I...System z Mainframe Data with Amazon S3 and Amazon Glacier (ENT107) | AWS re:I...
System z Mainframe Data with Amazon S3 and Amazon Glacier (ENT107) | AWS re:I...
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
Data Warehosing -Security
Data Warehosing -SecurityData Warehosing -Security
Data Warehosing -Security
 
Maximizing Business Value: Optimizing Technology Investment
Maximizing Business Value: Optimizing Technology InvestmentMaximizing Business Value: Optimizing Technology Investment
Maximizing Business Value: Optimizing Technology Investment
 
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage Costs
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage CostsWebinar: 3 Steps to be a Storage Superhero - How to Slash Storage Costs
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage Costs
 
De voordelen van hypervisor en back-up integratie
De voordelen van hypervisor en back-up integratie De voordelen van hypervisor en back-up integratie
De voordelen van hypervisor en back-up integratie
 
Aen004 Thorpe 091807
Aen004 Thorpe 091807Aen004 Thorpe 091807
Aen004 Thorpe 091807
 
Teradata Investor Presentation
Teradata Investor Presentation Teradata Investor Presentation
Teradata Investor Presentation
 

Más de Google

The Impact of Effective Performance Management
The Impact of Effective Performance ManagementThe Impact of Effective Performance Management
The Impact of Effective Performance ManagementGoogle
 
SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution Google
 
Leveraging Best Practice Methods in an Age of Digital Transformation Belfast ...
Leveraging Best Practice Methods in an Age of Digital Transformation Belfast ...Leveraging Best Practice Methods in an Age of Digital Transformation Belfast ...
Leveraging Best Practice Methods in an Age of Digital Transformation Belfast ...Google
 
Six Stages of Digital Transformation
Six Stages of Digital Transformation Six Stages of Digital Transformation
Six Stages of Digital Transformation Google
 
Leveraging Best Practice Methods in an Age of Digital Transformation - Slides
Leveraging Best Practice Methods in an Age of Digital Transformation - SlidesLeveraging Best Practice Methods in an Age of Digital Transformation - Slides
Leveraging Best Practice Methods in an Age of Digital Transformation - SlidesGoogle
 
Dublin Training & Certification Schedule July-December 2016
Dublin Training & Certification Schedule July-December 2016Dublin Training & Certification Schedule July-December 2016
Dublin Training & Certification Schedule July-December 2016Google
 
Belfast Training Schedule July - December 2016
Belfast Training Schedule July - December 2016Belfast Training Schedule July - December 2016
Belfast Training Schedule July - December 2016Google
 
SureSkills Belfast Schedule Jan - June 2016
SureSkills Belfast Schedule Jan - June 2016SureSkills Belfast Schedule Jan - June 2016
SureSkills Belfast Schedule Jan - June 2016Google
 
SureSkills Dublin Schedule Jan - June 2016
SureSkills Dublin Schedule Jan - June 2016SureSkills Dublin Schedule Jan - June 2016
SureSkills Dublin Schedule Jan - June 2016Google
 
Belfast Training & Certification Brochure
Belfast Training & Certification BrochureBelfast Training & Certification Brochure
Belfast Training & Certification BrochureGoogle
 
Dublin Training & Certification Brochure
Dublin Training & Certification BrochureDublin Training & Certification Brochure
Dublin Training & Certification BrochureGoogle
 
Espion and SureSkills Presentation - Your Journey To A Secure Cloud
Espion and SureSkills Presentation - Your Journey To A Secure CloudEspion and SureSkills Presentation - Your Journey To A Secure Cloud
Espion and SureSkills Presentation - Your Journey To A Secure CloudGoogle
 
EMC slideshow Belfast Event
EMC slideshow Belfast EventEMC slideshow Belfast Event
EMC slideshow Belfast EventGoogle
 
SureSkills Belfast Training Schedule Jan - Jun 2015
SureSkills Belfast Training Schedule Jan - Jun 2015SureSkills Belfast Training Schedule Jan - Jun 2015
SureSkills Belfast Training Schedule Jan - Jun 2015Google
 
SureSkills Course Schedule - January 2015 - June 2015
SureSkills Course Schedule - January 2015 - June 2015SureSkills Course Schedule - January 2015 - June 2015
SureSkills Course Schedule - January 2015 - June 2015Google
 
SureSkills Virtualization and Cloud Event June 12, 2014
SureSkills Virtualization and Cloud Event June 12, 2014SureSkills Virtualization and Cloud Event June 12, 2014
SureSkills Virtualization and Cloud Event June 12, 2014Google
 
SureSkills & Algonquin SMPM Integration Presentation Ottawa 2014
SureSkills & Algonquin SMPM Integration Presentation Ottawa 2014SureSkills & Algonquin SMPM Integration Presentation Ottawa 2014
SureSkills & Algonquin SMPM Integration Presentation Ottawa 2014Google
 
Integrating Project Management with Service Management Best Practices Event B...
Integrating Project Management with Service Management Best Practices Event B...Integrating Project Management with Service Management Best Practices Event B...
Integrating Project Management with Service Management Best Practices Event B...Google
 
Integrating Project Management with Service Management Best Practices, Feb 27...
Integrating Project Management with Service Management Best Practices, Feb 27...Integrating Project Management with Service Management Best Practices, Feb 27...
Integrating Project Management with Service Management Best Practices, Feb 27...Google
 
Agile Event Presentation - Nov 27th 2013
Agile Event Presentation - Nov 27th 2013Agile Event Presentation - Nov 27th 2013
Agile Event Presentation - Nov 27th 2013Google
 

Más de Google (20)

The Impact of Effective Performance Management
The Impact of Effective Performance ManagementThe Impact of Effective Performance Management
The Impact of Effective Performance Management
 
SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution
 
Leveraging Best Practice Methods in an Age of Digital Transformation Belfast ...
Leveraging Best Practice Methods in an Age of Digital Transformation Belfast ...Leveraging Best Practice Methods in an Age of Digital Transformation Belfast ...
Leveraging Best Practice Methods in an Age of Digital Transformation Belfast ...
 
Six Stages of Digital Transformation
Six Stages of Digital Transformation Six Stages of Digital Transformation
Six Stages of Digital Transformation
 
Leveraging Best Practice Methods in an Age of Digital Transformation - Slides
Leveraging Best Practice Methods in an Age of Digital Transformation - SlidesLeveraging Best Practice Methods in an Age of Digital Transformation - Slides
Leveraging Best Practice Methods in an Age of Digital Transformation - Slides
 
Dublin Training & Certification Schedule July-December 2016
Dublin Training & Certification Schedule July-December 2016Dublin Training & Certification Schedule July-December 2016
Dublin Training & Certification Schedule July-December 2016
 
Belfast Training Schedule July - December 2016
Belfast Training Schedule July - December 2016Belfast Training Schedule July - December 2016
Belfast Training Schedule July - December 2016
 
SureSkills Belfast Schedule Jan - June 2016
SureSkills Belfast Schedule Jan - June 2016SureSkills Belfast Schedule Jan - June 2016
SureSkills Belfast Schedule Jan - June 2016
 
SureSkills Dublin Schedule Jan - June 2016
SureSkills Dublin Schedule Jan - June 2016SureSkills Dublin Schedule Jan - June 2016
SureSkills Dublin Schedule Jan - June 2016
 
Belfast Training & Certification Brochure
Belfast Training & Certification BrochureBelfast Training & Certification Brochure
Belfast Training & Certification Brochure
 
Dublin Training & Certification Brochure
Dublin Training & Certification BrochureDublin Training & Certification Brochure
Dublin Training & Certification Brochure
 
Espion and SureSkills Presentation - Your Journey To A Secure Cloud
Espion and SureSkills Presentation - Your Journey To A Secure CloudEspion and SureSkills Presentation - Your Journey To A Secure Cloud
Espion and SureSkills Presentation - Your Journey To A Secure Cloud
 
EMC slideshow Belfast Event
EMC slideshow Belfast EventEMC slideshow Belfast Event
EMC slideshow Belfast Event
 
SureSkills Belfast Training Schedule Jan - Jun 2015
SureSkills Belfast Training Schedule Jan - Jun 2015SureSkills Belfast Training Schedule Jan - Jun 2015
SureSkills Belfast Training Schedule Jan - Jun 2015
 
SureSkills Course Schedule - January 2015 - June 2015
SureSkills Course Schedule - January 2015 - June 2015SureSkills Course Schedule - January 2015 - June 2015
SureSkills Course Schedule - January 2015 - June 2015
 
SureSkills Virtualization and Cloud Event June 12, 2014
SureSkills Virtualization and Cloud Event June 12, 2014SureSkills Virtualization and Cloud Event June 12, 2014
SureSkills Virtualization and Cloud Event June 12, 2014
 
SureSkills & Algonquin SMPM Integration Presentation Ottawa 2014
SureSkills & Algonquin SMPM Integration Presentation Ottawa 2014SureSkills & Algonquin SMPM Integration Presentation Ottawa 2014
SureSkills & Algonquin SMPM Integration Presentation Ottawa 2014
 
Integrating Project Management with Service Management Best Practices Event B...
Integrating Project Management with Service Management Best Practices Event B...Integrating Project Management with Service Management Best Practices Event B...
Integrating Project Management with Service Management Best Practices Event B...
 
Integrating Project Management with Service Management Best Practices, Feb 27...
Integrating Project Management with Service Management Best Practices, Feb 27...Integrating Project Management with Service Management Best Practices, Feb 27...
Integrating Project Management with Service Management Best Practices, Feb 27...
 
Agile Event Presentation - Nov 27th 2013
Agile Event Presentation - Nov 27th 2013Agile Event Presentation - Nov 27th 2013
Agile Event Presentation - Nov 27th 2013
 

Último

NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIUdaiappa Ramachandran
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum ComputingGDSC PJATK
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServicePicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServiceRenan Moreira de Oliveira
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceMartin Humpolec
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 

Último (20)

NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AI
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServicePicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your Salesforce
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 

CommVault Intro SureSkills Simpana 10 Event 2013

  • 2. Level Set What do Commvault do?         Backup & Recovery Archive Virtualization Deduplication Replication Content Indexing Snapshots Database Protection  Edge Data Protection  Cloud Storage  Storage Resource Management  Encryption  eDiscovery  Storage Infrastructure  Retention
  • 3. So why is Commvault so different?  Data Protection  Data Management  Information Management What are your customers looking for now?
  • 17. The Legacy Approach Point/Silo Approach to Data Management Windows Protection Search VM Protection Archive Storage Resource Management Deduplication HSM Snapshot Management Reporting Remote Backup Database Protection UNIX Protection Replication
  • 22. Your customers? Symantec Backup & Recovery Archive, Email, Files, eDiscovery & Compliance Data Reduction Deduplication & Compression Enterprise Reporting CA Technology IBM EMC Networker NetBackup D2D HomeBase TSM for SharePoint Centera Commo n Store Princeton Softech Enterprise Vault Xtenders SourceOne PureDisk Command Central SRM Control Center Replication, Management, & CDP Desktop / Laptop Replication Exec™ Recover Point Replistor NOT AVAILABLE DPA Repl. Manager
  • 24. Singular Information Management® Data Center Backup VM Protection SRM Snap Mgmt Database Protection Archive Reporting Remote Backup Replication Search Dedupe
  • 25. Single Platform for Data & Info Management Extensible and Adaptable APPLICATIONS DATABASES MESSAGING FILE SYSTEMS EDGE AUTOMATE MANAGE Data Management Business Insight  Protection Copies  Reduce Complexity  Archive Copies  Reduce Sprawl  Snapshot Copies  Increase Data Governance  Many Devices  Reduce cost  Many Locations  Increase Efficiency & Agility  Intelligent Index  Mitigate Risk RECOVER RETAIN DISCOVER REPORT ACCESS DISPOSE EMPOWER
  • 26. CommVault’s Mission and Background Solely dedicated to enterprise data and information management Simpana® Software provides truly integrated data management and protection Modern Data and Information Management enables companies to efficiently capture, move, retain, find and recover data from any storage tier Our customers reduce cost, improve operational efficiency and derive business value from their stored data
  • 28. Enterprise Disk Backup Magic Quadrant CommVault is positioned as a Leader in Gartner’s Magic Quadrant for Enterprise Backup/ Recovery Software for the third consecutive year • This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. • The Gartner report is available upon request from CommVault. • The Magic Quadrant is copyrighted by Gartner, Inc. and is reused with permission. • The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. • It depicts Gartner’s analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. • Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the “Leaders” quadrant. • The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. Source: Magic Quadrant for Enterprise Backup/ Recovery Software; by David Russell, Sheila Childs, Pushan Rinnen; June 5, 2013 © 2013 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. For more information, e-mail info@gartner.com or visit gartner.com. Used with permission.
  • 29. A Single Platform for Data & Info Management Extensible & Adaptable Backup and Recovery Deduplication Self-Service Access Snapshot Management Intelligent Archive Regulatory & Compliance Virtual Server Protection Storage Tiering Content Indexing for Search Simpana OnePass™ Technology Workflow CommVault Edge™ Technology Edge Data Protection Reporting, Trending, & Analytics Data Insight
  • 30. Simpana® Software Extensible and Exhaustive Data Management Commvault’s Simpana software for data protection and information management helps organizations manage data growth, cut costs and reduce risk by simplifying data management functions through a single, unified platform and architecture.
  • 31. Simpana® Software Extensible and Exhaustive Data Management What can we help you with?

Notas del editor

  1. Q1- For 1 point- Who can tell me the difference between Backup and Archive?Q2- For 2 points- What is a Hypervisor?Q3- For 2 points- What is the difference between source-and target-side Deduplication?Q4- For 1 point- Does a replicated copy of data constitute a backup? Q5- For 1 point- Why not?Q6- For 2 points- How and why do databases need to be protected differently then general file system data?
  2. Q1- For 1 point- Who can tell me the difference between Backup and Archive?Q2- For 2 points- What is a Hypervisor?Q3- For 2 points- What is the difference between source-and target-side Deduplication?Q4- For 1 point- Does a replicated copy of data constitute a backup? Q5- For 1 point- Why not?Q6- For 2 points- How and why do databases need to be protected differently then general file system data?
  3. Let me start by telling you a little story….Looking back, life in IT used to be simple. Slow, but simple. A leisurely walk through the park with days of punch cards, reel-to-reel tape, mainframes. The blood and guts of your data center might live on a tape or two that you could juggle if you were feeling adventurous. Disaster recovery might mean throwing a box of DLT tapes in the back of the family wagon for the weekend. A server was a server, an application was an application that lived on that server, and you could back it all up with tape, oh glorious tape… The good ole days.
  4. But life’s gotten a bit more complex these days. The Protection of Traditional Data, while still a challenge for many, is really only one minor piece of the puzzle
  5. Environments are becoming more complex, with the interaction between the server, application, OS, and storage layers interwoven. Keeping track of the interdependencies is proving to be more and more challenging, especially considering the lack of robust reporting in most environments.In the same vein, the sourceof data generation from is now spread across geographies and devices, beyond the datacenter from remote, branch, home offices, and edge devices. Regardless of the source, the value and criticality of the data is not remains, but the complexity of managing it increases..
  6. Another area that’s being discussed frequently in the market is the concept of big data, and the challenges that customers are having contending with the massive data sets that are being generated. There are 2 ways to look at the big data challenge: for most customers the biggest challenges they have are dealing with the ever-expanding data sets that they need to manage in their environment. When an organization was contending with data sets in the gigabytes, traditional methodologies of protection and management were sufficient.ClickBut as the volume of data continues to grow exponentially, from gigabytes, to terabytes, to in some cases petabytes of data traditional methods of management and protection are no longer sufficient.In addition, despite storage costs which diminish on a per terabyte basis year after year, the volume of data growth is outpacing savings, and the cost of storing data continues to grow exponentially.
  7. The other big driver around the “big data” phenomenon surrounds leveraging analytical tools in order to gain business value from the mounds of information being collected.That said, the volume of data available, the wide variety of data in environments, and the velocity by which data characteristics change prove to be barriers to deriving true value from an organization’s data.Optional for referenceOver the last 18 months, the term “Big Data” has been used in more and more data centers. Depending on the vendor nomenclature, the term is sometimes used to describe the skyrocketing size of the data footprint within the data center and management challenges associate with it, and sometimes describes processes and methodologies used to derive business value through the analysis of that data. Many businesses, particularly in certain verticals, want to be able to take a look at the unstructured data within their data center and gain knowledge about their business operations.
  8. Another factor that comes into play is the continued growth of virtualization technologies. Whereas just a few years ago, virtualization may have been relegated to the back corner of the datacenter and used for non-mission critical applications now many organizations are virtualizing their data centers in their entirety. Many customers have had challenges dealing with the new virtualization paradigm in terms of how to sufficiently manage and protect these environments.Many of the traditional data protection vendors were caught off-guard with the virtualization boom, and the legacy platforms they provide customers did not suffice for these new models.
  9. Virtualization has also been a catalyst for the migration to cloud-based managed service offerings.Multi-Tenancy and IT as a Utility have not only blurred the Data Center’s role but have also driven wider adoption of all virtualization technologies: Server, Storage and Networking. This move has meant that protection, manageability and dynamic reaction to change have become high priority business items that need to be addressed. This is manifesting itself in a number of ways:Many customers are migrating some or all of their applications and assets to cloud environmentsSolutions Providers are developing new models and services to accommodate those demandsAnd customers are taking advantage of the technologies that enable more effective provision of services to their internal customers in an attempt to accommodate demand and maintain their relevance in their organizations.
  10. The mobilization trend within the corporate workforce has put new challenges on IT staff in data centers everywhere. Now, mobile users need access to critical data and applications wherever they may be. Even if a company’s workforce is not inherently mobile, bring your own device policies and the continued growth of data residing on smartphones and tablets pose similar issues to data centers across the world. In addition, the enforcement of IT policies and protection of data residing outside the data center become critical for successful IT operations.
  11. The BYOB trend is also exacerbated by users becoming more savvy, and being accustomed to having access to their data anytime,anywhere and on demand. Users and have had exposure to technologies such as commercial file sharing and synchronization services which leads to expectations of a higher SLAs from their IT departments.
  12. With the growth of data management, the burden of eDiscovery has shifted to IT. For most companies, stopping tape rotation and farming the media to a third party is no longer an effective means of addressing discovery requests. IT’s role in legal discovery has grown to ensure that the right data is being captured so that ensure that the organization is capable of supplying the necessary information for litigation or compliance purposes without disrupting overall business operations.
  13. And last but certainly not least is the fact that IT organizations are being tasked with these increasing burdens while concurrently staff has been reduced due to economic pressures. Folks are continuously being asked to do more with less,.
  14. These factors, as well as many others, have led to a perfect storm of data management challenges that are causing organizations to rethink their traditional methodologies for protection and management of their critical data assets.
  15. The simple fact is that backup in and of itself no longer equates to a comprehensive data management strategy. The good old days are gone, and organizations need to find ways to modernize their data management strategies.
  16. When we look at how organizations have addressed data management issues historically, it has been primarily with a silo approach, but as data management challenges have emerged, organizations have invested in point solutions to address them. Often times this is due to the fact that their legacy solutions cannot accommodate the new emerging protection and management needs.For example you see many environments where multiple backup solutions exist. One for data center assets, another for protection of mission-critical databases, and another for virtualized environments. Likewise differing solutions are often deployed for protection of data in remote sites or data that resides at the edge of an environment on laptops and remote desktops.As another example, when de-duplication started to emerge as a viable technology in the market, many organizations invested in appliances to address the long-term capacity management and retention needs that the duplication helps to address.The bottom line is that customers end up with multiple point solutions that have minimal or no integration points across them, even though they are dealing with the same data on the backend.
  17. Pools of Data and InfrastructureIn a silo approach, customers are left with islands of infrastructure scattered throughout an organization. Whether it’s servers, networking infrastructure, storage, or some combination thereof, or appliances which are essentially a server with some storage and proprietary software running on it, you wind up with isolated pockets of infrastructure that cannot be leveraged except for their designated purpose. If you’ve been around the market long enough you’ll recognize this as being very similar to the challenges organizations had with direct attached storage prior to the emergence of San and network attached shared storage technologies. All of this hardware has costs associated with it, that can contribute to non-optimized and inefficient infrastructure spend.
  18. One of the obvious burdens of having a multitude of solutions in a single environment is the operational aspect. Often the solutions are spread across multiple functional groups, and valuable resources are pulled away from their core competencies and value to help with the data management functions.
  19. The redundant data in organizations is also highly problematic.Some of this is due to obvious reasons, such as the same files being housed across multiple users, but we also see inefficient use of storage due to application owners tendency to over protect their digital assets.There's a large customer of ours in the Midwest that was using our software to protect much of their environment, and they were exploring expanding their capabilities to protect more of their advanced databases. We assisted with an analysis for them, and one of the things that we found was that on average their Oracle databases were being copied 12 times, with all of the dumps sitting on primary spinning disk.In non-optimized non-managed environments, the redundancy of data can lead to wasted storage and increased costs.
  20. Legacy data management solutions may be able to accommodate some of the challenges facing their customers with a silo’d point solution approach, but instead of solving problems of complexity, operational efficiency and cost, they are actually exacerbating many of these issues.
  21. And if we look at our competitive brethren in the market, they’ve actually propagated this issue. As data management challenges have emerged in the market, many of the organizations in this space have grown their portfolios by acquiring organizations whose products address specific needs. For sake of example, when de-duplication began to emerge as a viable and effective technology, the major backup and recovery providers went shopping to acquire niche organizations that could facilitate their presencein this arena.You will invariably hear providers talk about buying best-of-breed solutions to build their portfolio. But remember, only one can be best-of-breed,then you are left with the best of whatever is left over.You’ll also hear about the integration of these disparate solutions, but is usually an iterative process that takes place over multiple releases of the software packages. Much of the development efforts are focused on integrationat the expense of innovation.
  22. The grid depicted here is in stark contrast to the approach that CommVault has taken with our Simpana(r) data management software suite. CommVault’s Simpana® software combines a multitude of data management functions into a truly integrated software suite that has been built on a common code base without injection of third-party solutions. We call it our Singular Information Management® philosophy.
  23. CommVault’s Simpana solution provides the capability to handle a wide variety of data management functions in a truly integrated holistic package for data management and protection. By adopting Simpana® software, a customer can see a dramatic increase in operational efficiency, as well as significantdecrease in costs and inefficiencies associated with data management on both the infrastructure and operations side.This is how Simpana software can drive significant savings and operational efficiencies within organizations. By combining data management functions into a common platform, also known as are common technology engine, we are able to reduce infrastructure burden, drive operational efficiencies, and significantly reduce costs for organizations.
  24. The Common Technology Engine continues to be the CommVault’s innovative platform. The messaging on this slide depicts the architectural flexibility that Common Technology Engine continues to provide. This platform provides the infrastructure benefits inherent in previous releases of Simpana software but continues to enhance the enterprise integration of those products. CommVault continues to enhance Simpana® features and functionality, several of which will be addressed in the remainder of this module.
  25. Simpana Software includes “best-in-class” modules for:Backup, Recovery & DRDeduplicationVirtualization and CloudArchiveeDiscoverySearch
  26. To wrap up, Commvault’s Simpana software for data protection and information management helps organizations manage data growth, cut costs and reduce risk by simplifying data management functions through a single, unified platform and architecture. Our common code base ensures that you’ve purchased not only a product that is mature, but also stable and proven.The extensibility of the platform to deliver new features and functionality to meet emerging needs provides “future-proofing” of the data center, along with investment protection.
  27. To wrap up, Commvault’s Simpana software for data protection and information management helps organizations manage data growth, cut costs and reduce risk by simplifying data management functions through a single, unified platform and architecture. Our common code base ensures that you’ve purchased not only a product that is mature, but also stable and proven.The extensibility of the platform to deliver new features and functionality to meet emerging needs provides “future-proofing” of the data center, along with investment protection.