Backup - Disaster Recovery - Cyber Secure

Dell EMC IDPA

image27

Dell EMC Integrated Data Protection Appliances


DP4400  2U - 24-96TB 

Mid Range  Enterprise


DP5300 42U up to 6.5PB

 Mid Range Enterprise


DP5800 42U up to 43.2PB

Mid Range Enterprise


DP8300 42U up to 108PB

Large  Enterprise


DP8800 42U up to 150PB

Large  Enterprise

 

  • Data protection storage and software
  • Backup, archive, and recovery
  • Cloud tier for long-term retention
  • Flash-enabled for fast restores
  • 55:1 average de-duplication rate


Certified Dell EMC Deployment Engineers

Data Domain

image28

Dell EMC Data Domain


DD3300 up to 32TB usable - 200 to 1.6PB logical


DD6300 up to 178TB usable -1.8 to 8.9PB logical


DD6800 up to 288TB usable 


DD9300 up to 720TB


DD9800 up to 1PB 

Avamar

image29

Dell EMC Avamar Data Protection 


Dell EMC Avamar enables fast, efficient backup and recovery through its integrated variable-length deduplication technology. Avamar is optimized for fast, daily full backups of physical and virtual environments, NAS servers, enterprise applications, remote offices and desktops/laptops.

By deduplicating data - identifying only unique daily changes - Avamar reduces backup storage by up to 30x and network bandwidth consumption by up to 99%. Data is always encrypted and compressed in-flight to meet security and compliance regulations. And with Dell EMC Data Domain Cloud Tier, you can natively tier backup data to the cloud for long-term retention.

Avamar is available standalone or as a component of Dell EMC Data Protection Suite, which offers you a complete suite of data protection software options. 


RecoverPoint

image30

RecoverPoint provides continuous data protection for operational recovery and disaster recovery. It enables any-point-in-time recovery for diversified storage environments both within and across data centers.

Should your data become compromised or lost, you'll be able to go back in time and recover that data in a consistent state. RecoverPoint technology makes data loss reversible so you can be assured that your data is safe. It extends VMware Site Recovery Manager (SRM) functionality with any point-in-time recovery. 


Combining RecoverPoint 4.1 and EMC VPLEX 5.4, MetroPoint topology enables data replication from an EMC VPLEX Metro region of two data centers to a third site over distance and provides disaster recovery that can sustain two-site failures. It helps organization to achieve a new level of continuous availability, disaster recovery, and continuous data protection that can sustain multisite failures.

Recover Point for VM

image31

RecoverPoint for Virtual Machines is hypervisor-based, software-only data replication that integrates with VMware vCenter (customer supplied).

Key features:

  • Protect VMware virtual machines with granular recovery to the VM level
  • Use orchestration to enable test, failover, and failback to any point in time
  • Replicate VMs (VMDK and RDM) locally and remotely
  • Support replication policies over any distance: synchronous, asynchronous, or dynamic
  • Use consistency groups for fast, application-consistent recovery of VMs
  • Optimize WAN bandwidth use with data compression and deduplication

Avamar

image32

Dell EMC Avamar Data Protection Software

Dell EMC Avamar enables fast, efficient backup and recovery through its integrated variable-length deduplication technology. Avamar is optimized for fast, daily full backups of physical and virtual environments, NAS servers, enterprise applications, remote offices and desktops/laptops.

By deduplicating data - identifying only unique daily changes - Avamar reduces backup storage by up to 30x and network bandwidth consumption by up to 99%. Data is always encrypted and compressed in-flight to meet security and compliance regulations. And with Dell EMC Data Domain Cloud Tier, you can natively tier backup data to the cloud for long-term retention.

Avamar is available standalone or as a component of Dell EMC Data Protection Suite, which offers you a complete suite of data protection software options. 

DELL EMC CYBER RECOVERY SOLUTION – The Last Line of Data Protection Defense Against Cyber-Attacks

WHY CYBER RECOVERY? Recovery is the key. Ensuring your business-critical data can withstand a cyberattack designed to destroy your data including backups and replicas. Could you survive? Here are the five steps to building a last line of defense.  Solutions Planning - Selection of application candidates, recovery time, and recovery point objectives. Isolation & Governance – An isolated data center environment that is disconnected from the network and restricted from users other than those with proper clearance. Automated Data Copy and Air Gap – Software to create WORM-locked data copies to a secondary set of arrays and backup targets as well as processes to create an operational air gap between the production environment and the isolated recovery zone.  Integrity Checking & Alerting - Workflows to stage replicated data in the isolated recovery zone and perform integrity checks to analyze whether it is impacted by malware along with mechanisms to trigger alerts on suspicious executables and data. Recovery & Remediation - Procedures to perform recovery / remediation after an incident using dynamic restore processes and your existing DR procedures. 



image33