Paul McClure Chief Technologist, Cloud Solutions Group Transform Data Protection with Mobile and Cloud Infrastructures Prepared for:
Nov 20, 2014
Paul McClureChief Technologist, Cloud Solutions Group
Transform Data Protection with Mobile and Cloud Infrastructures
Prepared for:
c
Introduction
Market DynamicsChallengesKey Considerations
Summary
cMarket Dynamics
cMarket DynamicsRisk Management, BYOD & Access
c
Source: http://www.gartner.com/newsroom/id/2466615
“As enterprise bring your own device (BYOD) programs continue to become more commonplace, 38 percent of companies expect to stop providing devices to workers by 2016”according to a global survey of CIOs by Gartner, Inc.'s Executive Programs
Market DynamicsBYOD
cMarket Dynamics“as a Service”
c
Accidental deletionAccidental deletion is a common source of data and productivity losses.
Control over corporate dataNumerous consumer-grade cloud backup options exist and employees are aware of or using them.
Anytime, anywhere workerWorkers are increasingly distributed and mobile which means they will save more data locally and they are at a higher risk of losing the device.
E-discovery costsThe costs associated with searching across distributed PCs would be prohibitive.
Operating system upgradesAs companies upgrade to Windows 8, they need a way of easily transferring data.
ChallengesUse Cases
c
Backup Sync & Sharevs
Key ConsiderationsApproach
Gartner, Inc. |
G00235971Device/OS diversity
Degree of diversity in endpoint devices and endpoint OS platforms supported
Content varietyType of local content that can be backed up and restored
Heterogeneous restoreAbility to restore to a different device and/or a different OS platform
ScalabilitySize of the deployment in the real world, not based on product design
PerformancePerformance-boosting techniques, such as incremental backup, compression, and throttling for network bandwidth and CPU cycles
Source: Critical Capabilities for Enterprise Endpoint Backup (Gartner, Inc. | G00235971)
Key ConsiderationsTechnology / Solution
c
Data reduction techniquesType of data reduction techniques, such as file-level single-instance restore, or block-level or object-level data deduplication
Data capture frequencyHow frequent the backup data can be captured
SecurityCommonly deployed security features, such as access control methods, encryption, and remote wipe and remote tracking of devices
Administrator experienceFactors impacting administrator experiences, such as silent deployment of group or companywide policies, task delegation, separation of corporate content from personal content, reporting tools, and so forth
Source: Critical Capabilities for Enterprise Endpoint Backup (Gartner, Inc. | G00235971)
Key ConsiderationsTechnology / Solution
cUser experienceFactors impacting user experiences, such as user interface, self-restore capability, single sign-on and whether there is a mobile app
Cloud services supportDegree of supporting the vendor's own cloud or third-party cloud
E-discovery functionsFunctions that allow easy e-discovery for compliance, such as full-text indexing and search, federated search, and support of legal hold
Source: Critical Capabilities for Enterprise Endpoint Backup (Gartner, Inc. | G00235971)
Key ConsiderationsTechnology / Solution
c
c
Physical Virtual Public Cloud
Applications
ServersNetwork
Storage
Private Cloud
SummaryCommVault® Simpana Software
SummaryCommVault EdgeTM (End Point Data Protection including Backup, Sync & Share + eDiscovery)
Compliance Search
Custodian Hold
Add data into the Content
Store
UploadSharing
Share Files/Folders with others
(web)
Lock
User-SetAccess Lock
Edge Web console
Edge Mobile
access
File Sync
Cloud Solutions Group
THANK YOU
Paul McClureChief Technologist, Cloud Solutions Group