Professional Documents
Culture Documents
DPSModernizationandTransformation2019 - 07 - 25poland V1-Dist
DPSModernizationandTransformation2019 - 07 - 25poland V1-Dist
DPSModernizationandTransformation2019 - 07 - 25poland V1-Dist
PK Gupta
Global PreSales Lead, Data Protection Solution
(COMPARED TO 2% IN 2016)
Modern data protection has been shown to be a part of many IT Transformation initiatives.**
5% 1% 2% 3%
Less than 1
14% 23% Extremely likely
16% year
27% Likely
1 to 3 years
73% of organizations have had their backup software for > 4years
4
4
56% are “likely or highly likely” to replace their backup software
© Copyright 2019 Dell Inc.
Data Protection Evolution
Backup and Archive to Tape Tape Centric with Disk Disk Centric
DATA
Changing Workloads Data Expansion to
& Expectations Edge & Cloud
New Data Sources and Applications Central control for Distributed Data
New security and reuse expectations
Many Single
Zero Touch Application
Resources Server
(Simple) Protection
(Complex) Protection
Faster backups, restores, Utilizing the least amount Industry-best fault Covering the widest range Leverage the cloud for
and offsite replication of storage, compute, and correction and data of applications, operating long term retention,
network resources validation environments, and service replication, disaster
levels recovery, in-cloud
backups at the lowest cost
to serve.
Converged Cloud Adoption Data Protection
1000%
Year over Year growth of 700% +500 1 EBs #1
the Integrated Data Increase in DPS public Unique Logical Data In Data Protection
Protection Appliance6 cloud consumption in Customers in Protected a month in Appliance
less than 2 years7 AWS/AZURE AWS and Azure9 & Software Market10
alone8
Current Backup
Database Direct
DPS Suite SW
CDP / Direct
3rd Platform
OS Backup
DELL EMC
Data Direct
ANY
Application
Software
Desktop/
VMware
Storage
Solution
Archive
Laptop
Direct
Direct
Direct
Protection Approach
Big
(Most efficient & Optimized)
ANY
Protocol Support All Use Cases (VTL/CIFS/NFS/NDMP/DDBoost/BoostFS)
(Dedup at source)
• Global deduplication
• Multiple vendor support
• Single platform for backup
and archive
• Peace of mind ‘set and forget’
• Investment Protection
Dell EMC Data Protection Suite
Centralized monitoring
and management
Disaster recovery
Continuous replication
Cyber recovery
Recent Simplification
Innovation
Highlights VMware Native integrations
Cyber Recovery
Internal Use - Confidential
14 of Y
Cloud
workloads in
“Scale-Out” Traditional
Vendor B Vendor A NW 18.2 / DDVE 4.0
Cost
# of Compute Instances 12 2 3
5$91,077
% 8 41,254% $ 549
Compute (EC2)
More More
Block Storage (EBS) $ 3,798 1,261 $ 1,413
Search
3
4
T 3
B 4
T 3
B 4
T Reporting
B Protection Storage
DP Appliance
20 © Copyright 2019 Dell Inc.
VMware Native integrations
The Challenge
93%
CAGR in Ransomware
variants from 2010 to 2018
92%
Organizations cannot detect
cyber-attacks quickly
*
59%
Believe that isolating
affected systems and
recovering from backups
Industry’s ONLY Air Gap Solution to ensure protection
should be the response to
Internal Use - Confidential
ransomware
22 of Y
BRIDGE THE GAP: NEXT GEN DATA PROTECTION
Digital
Transformation
IT
Transformation
Faster App
10x
Delivery
Competitive
5x
Differentiator
Revenue
2x
Goals
IT
Transformation Tomorrow
Today 30
20% 10
60% 70%
10
Faster App
10x
Delivery
Competitive
5x
Differentiator
Revenue
2x
Goals
IT
Transformation
Target
Faster App
10x
Delivery
Competitive
5x
Differentiator
Revenue
2x
Goals
IT
Transformation
Target
10x
Faster App Converged SDDM
Delivery
Competitive
5x
Differentiator
Revenue
2x
Goals
Object Storage
IT
Transformation
Target
10x
Faster App Converged SDDM
Delivery
Competitive
5x
Differentiator
Revenue
2x
Goals
Object Storage
IT
Transformation CSM
IDPA
Target
Data
AVE
Domain NVE
DD VE
10x
Faster App Converged SDDM
Delivery
Competitive
5x
Differentiator
Revenue
2
Goals
Object Storage ECS
x
Cyber Recovery Vault CRS
New strike
summary for
assets
(clients)
Modern HTML5-Based UI for Backup Engine
D E L L E M C D ATA P R O T E C T I O N
Large Enterprise
DP8800
Midsize Enterprise
DP8300
8TB DP4400
Usable
Capacity 24TB1 1PB1
Dell - Internal Use - Confidential
32 © Copyright 2019 Dell Inc.
Modern Management
Data
First will Redefine Data Protection
Software Defined
Choice of
Integrated Data Management Consumption
SaaS
Single SDDM Platform
Hybrid
LOGICAL CAPACITY1 640 TB to 5.6 PB 1.76 PB to 11.2 PB3 2.88 PB to 16.8 PB3 4.0 PB to 22.4 PB3
USABLE CAPACITY 64 TBu - 112 TBu 176 TBu - 224 TBu3 288 TBu - 336 TBu3 400 TBu - 448 TBu3
USABLE CAPACITY 64 TBu - 96 TBu 160 TBu - 192 TBu 256 TBu - 288 TBu 352 TBu - 384 TBu
S O FTWARE
&
IDPA
APPLIANCES
IDPA
Integrated Data
Data Protection
Protection Data Protection Data Protection
Storage
Appliances Appliances Storage
Ransom: $30,000
Lost Revenue 2,500,000
Incident Response 75,000
Legal Advice 70,000
Lost Productivity 250,000
Forensics 75,000
Recovery & Re-Imaging 60,000
Data Validation 25,000
Brand Damage 500,000
Litigation 200,000
Total Costs of Attack $3,785,000
Keeping
50
Customers after a ransomware attack = Priceless
Dell - Internal Use - Confidential
Ransomware Increasingly Targeting Backup
1
Backup catalog
• Master Server (Backup Catalog): Backup master server is
1 targeted and infected resulting in encrypted/wiped backup
Master Server Backup Client catalogue
Backup data
2• Media Server: All mounted filesystems on the media server are
targeted and encrypted/wiped
3• Backup Targets:
– Disk/Deduplication Appliance: Filesystems on the
2 media server are targeted and encrypted/wiped
Media Server
– Tape: Provides a better chance to recover from the
destructive event if threat was removed from the
environment prior to attack. However, if backup
Backup targets catalogue is held hostage or destroyed, recovering from
the tape will be increasingly difficult
3
Tape Disk
Dedicated Connection
Air Gap
Corporate
Network
DR/BU
Cyber Resilience
Hardening & Advanced Features
• Product specific hardening guides
• Encryption in flight and/or at rest
• Retention lock with separate security officer credentials
• Two-Person Authentication
55
Vulnerabilities: Technical
Non-HA backup server represents Backup catalogue is not replicated - restoral from point-in-time
single point of failure backup may result in loss of backup data
Recovery of
Long Term backup catalogue
Backup images Retention from tape may
Backup
may be Franchise Master Tape
lead to failure to
prematurely Critical Hosts Server Library meet RPO/RTO
expired without and result in
authorization protracted service
restoral times
Backup
Non-franchise
Franchise critical Critical Hosts
Media
and non-franchise Servers
critical data are not Backup
segregated Storage
56
Vulnerabilities: People & Process
Rogue Backup Admin prematurely expires Server/Storage Admin destroys primary storage
backup images from NBU catalogue LUN hosting backup catalogue
Long Term
Disgruntled DBA Retention Backup tapes are
Backup stolen, lost or
runs script to corrupt Franchise Master Tape
franchise critical app Server
maliciously
Critical Hosts Library
DB destroyed
Backup
Non-franchise
Media
Critical Hosts
Servers
Backup
Elevated access
Admin’s laptop is Storage credentials are stolen and
compromised and exploited to destroy backup
exploited as host to Backup Mgmt Backup data
execute malware Console Reporting/Ops
Short Term
Mgmt Server
Retention
Internal Network
57
Current State: Risk Profile Summary
Technical People & Process
All data is currently susceptible to a cyber attack IT Engineering and Ops have access to most if
not all Backup Assets
Primary storage replication can replicate Security teams not assigned to assets. Bad
corruption actors inside the firewall can create havoc.
Backup catalog not replicated Franchise critical and non-critical data are not
segregated
Recovery of backup catalog from tape is slow Backup images can be expired without
and failure prone authorization
Backup copies not isolated from network
58
Regulatory cybersecurity guidance
FFIEC: “Data Or Systems Destruction and Corruption... Another control for consideration is an "air-gap," a security
measure in which a computer, system, or network is physically separated from other computers, systems, or
networks. An air-gapped data backup architecture limits exposure to a cyber attack
and allows for restoration of data to a point in time before the attack began.“
Federal Reserve System: “financial institutions should consider … logical network segmentation,
hard backups, air gapping [and] physical segmentation of critical systems”
European Banking Authority: “Competent authorities should assess whether the institution has
comprehensive and tested business resilience and continuity plans in place”
National Security Agency: “best practices to protect information systems and networks from a destructive
malware attack include... Segregate network systems”
National Association of Insurance Commissioners: “... it is vital for state insurance regulators to
provide effective cybersecurity guidance regarding the protection of the insurance sector’s data security
and infrastructure..”
59
Dell EMC
Cyber Recovery Solution
Dell Technologies Cyber Recovery
Cyber Recovery Vault
1
Synchronization
Data
Metadata
2 3
Immutable Sandbox
Copies
61
Dell EMC Cyber Recovery: Exposures Addressed
Switches are only logical point of Management host opens/closes ports
Non-HA backup server represents entry and open only ports required for based on schedule and DD probes.
single point of failure scheduled replication and alerting Applies Retention Lock on DD.
62
63
Where to start - Cyber Recovery Services
• Advisory Services ADVISORY
SERVICES
IMPLEMENTATION SERVICES COMMON CUSTOM
SERVICES
create consensus
and speeds design
• Business Metrics • Operationalize Processes
• Implementation • Critical App & Data • Manage/Monitor
focuses on Identification • Backup Segregation
• Application • Reporting w/Data Diode
technology and Dependencies
• Advanced Vault Analytics
processes • Solution Design or Validation Processes
• IR Vault Security • Scheduler
Architecture • Vault Architecture (AirGap, Management, Alert..)
• Ability to customize • Solution & Service • Custom AirGap Copy Script
• Portal Based CR Services
Cost Estimates • Dashboard
services • Operationalization &
• Retention Lock
• Service Catalog Integration
• Run Books
Implement • Governance Design
• Technology Hardening
Roadmap • Cyber Incident Response
• Change Control Integration Center
• Business Case
• Backup Segregation (opt)
• Executive
Presentation • Operate & Validate Roadmap
• Restore Testing
64
Dell EMC Services for Cyber Recovery Solution