Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 12

COMMVAULT OVERVIEW

COMMVAULT’S SINGLE PLATFORM


DELIVERING SOFTWARE-DEFINED DATA PROTECTION, COMPLIANCE AND DISCOVERY

One virtual repository


to aid in access and use,
and eliminate the issue
of “copy data”
One Virtual Repository

Single index Dedupe Compress Encrypt Retain Snap Replicate Archive Erase
lets you know where
and what your data is,
in unprecedented detail Protect Access Comply Share
Single Index
Industry-leading Classify Organize Report Policy Search Discover Analyze Collaborate
management capability Physical Virtual Mobile Private Hybrid Public M Public A SaaS
provides a single pane
of glass
Management Operations
Help meet General Data
Manage Monitor Analyze Report Automate
Protection Regulation
(GDPR) obligations
across Endpoints, Data
Centres and Cloud
REPLICATION OF DEDUPLICATED DATA

DASH Copy
 Enables transmission of data in deduplicated reduced form between Media Agents
 Reduction in bandwidth consumption facilitates disaster recovery
 Eliminates need for vendor-specific array replication for DR

B B
A C D
C D
E
BCD

Only New Blocks Transferred


Hash References Recorded in
DDB
VIRTUAL SERVER AGENT FOR AZURE
Expanding Capabilities

• Agent-less backup of an
Azure VM
• Classic & ARM (Azure
Resource Manager)
support
• Granular file-level
recovery
• Cross-hypervisor
restore options planned
MICROSOFT OFFICE 365

O365 Integration
• Leverage OnePass™ collection
• Cost effective long-term retention
• Enterprise Search
• Access to data in case of internet
outages

O365 Limitations
• Litigation preparedness “Office 365 email archiving capability does
• Lack of granularity in provide many basic archiving capabilities, but
retention/disposition does not meet the additional eDiscovery and
regulatory requirements with which many
• Federated search and e-Discovery organisations are faced.”
Osterman Research (Building a Case for Third Party Archive, 2015)
• Storage and other “hidden” costs
• Offline issues
ACCESSING EXCHANGE DATA

Outlook Outlook Web App IMAP Web Console Mobile Access


CONTENTSTORE MAIL

End User Access to Data from within Outlook with


a Native Folder Structure and Message
Capabilities
(e.g. preview, open, forward, reply, search)
 Integrated with Outlook

ox
lb
ai
M
 Self-Service Data Access

y
ar
im
Pr
 Efficient Restores

Content Store Mail

Exchange
Commvault
OnePass™
THE GENERAL DATA PROTECTION REGULATION (GDPR)
• Users have rights over their data1 and they must give their consent to:
• Store it (they also have the right to request that it is corrected or erased)
• Process it (they also have the right to stop it being used)
FINES UP TO 4% OF GLOBAL
• Organisations must:
ANNUAL
• Document what data TURN-OVER
they have, what theyORdo with20 MILLION
it, who it’s shared with, …
EUROS
• Do everything (WHICHEVER
possible to avoid a data breach2IS HIGHER)
• If a breach
FOR EACH
occurs, BREACH
that could OR
have a negative FOR
impact on anNON-
individual (such as
identity theft3), they must notify the individual (so they can minimise any likely
damage) and the authorities COMPLIANCE
within 72 hours
1. Applies to any personal data4 stored on EU citizens and it comes into force 25 May 2018
2. A data breach is a security incident in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorised to do so
3. Identity theft occurs when someone uses another's personally identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other
crimes
a. Other Personally Identifiable Information (PII) or Sensitive Personal Information (SPI) information includes DOB, address, email address, previous addresses, mother’s maiden name, the
place where you were born, pin number, bank account details, national insurance number and passwords
4. Personal data is any information relating to an individual, whether it relates to his or her private, professional or public life - it can be anything from a name, a photo, an email address, bank details,
posts on social networking websites, medical information, or a computer’s IP address
GDPR’S IMPACT ON IT AND HOW COMMVAULT CAN HELP
• Take all reasonable endeavours to prevent a data breach (i.e. review use of encryption,
firewalls and IDS/IPS, and review security policies including access rights, etc.)
• Retain data for the minimum amount of time - once it’s of no use delete it from all tiers
(production, backup and archive)
• Content DEVELOP A COMPREHENSIVE
index all tiers of un-structured 1
data across endpoints, data DATA
centres and cloud
• Identify any Personally Identifiable Information (PII) or Sensitive Personal Information
PROTECTION, COMPLIANCE AND
(SPI) and pro-actively erase as soon as possible
• Upon request DISCOVERY
perform key word searches STRATEGY WITH
(i.e. for an individual’s name) across all tiers
• Export data and send it to the individual
• Correct any errors and provideCOMMVAULT
the updates to anyone that the data is shared with
• Erase the data and maintain an audit log of the action
• Report any breaches that involve any PII or SPI data
• If the exact details of the data are not known restore it and review

1. Includes files, E-Mails and SharePoint (the same applies for structured systems, but in general they have native search and erasure capabilities)
GOING BEYOND THE SOFTWARE PLATFORM

AWARD WINNING CUSTOMER SUPPORT STRATEGIC ALLIANCES UNLOCK


97% customer satisfaction rating UNIQUE VALUE
Technology Partnerships with
Industry Leaders
INDUSTY-LEADING CONSULTING SERVICES
95% of customers are likely to
recommend Commvault Consulting

BEST-IN-CLASS EDUCATION SERVICES


93% of trained customer indicate
positive impact on job success
WHO SAYS WE’RE A LEADER? GARTNER DOES.
SIX TIMES IN A ROW.
Gartner: 2016 Magic Quadrant for Enterprise Backup Software and Integrated Appliances

• This Magic Quadrant graphic was published by • Gartner does not endorse any vendor,
Gartner, Inc. as part of a larger research note product or service depicted in its research
and should be evaluated in the context of the publications, and does not advise
entire report. technology users to select only those
vendors with the highest ratings. Gartner
• The Magic Quadrant is a graphical
research publications consist of the
representation of a marketplace at and
opinions of Gartner’s research
for a specific time period.
organization and should not be construed
• It depicts Gartner’s analysis of how certain as statements of fact. Gartner disclaims all
vendors measure against criteria for that warranties, expressed or implied, with
marketplace, as defined by Gartner. respect to this research, including any
• A complimentary copy of the complete warranties of merchantability or fitness
Gartner report is available through the for a particular purpose.
Commvault website.

See full report through this link.


THANK YOU

You might also like