Presentation is loading. Please wait.

Presentation is loading. Please wait.

COMMVAULT OVERVIEW.

Similar presentations


Presentation on theme: "COMMVAULT OVERVIEW."— Presentation transcript:

1 COMMVAULT OVERVIEW

2 COMMVAULT’S SINGLE PLATFORM
DELIVERING SOFTWARE-DEFINED DATA PROTECTION, COMPLIANCE AND DISCOVERY One virtual repository to aid in access and use, and eliminate the issue of “copy data” One Virtual Repository Single index lets you know where and what your data is, in unprecedented detail Dedupe Compress Encrypt Retain Snap Replicate Archive Erase Protect Access Comply Share Single Index Physical Mobile Private Hybrid SaaS Public M Public A Virtual Classify Organize Report Policy Search Discover Analyze Collaborate Industry-leading management capability provides a single pane of glass Management Operations Help meet General Data Protection Regulation (GDPR) obligations across Endpoints, Data Centres and Cloud Manage Monitor Analyze Report Automate For the last twenty years Commvault has consistently addressed its customer’s needs with a single platform that is unique in the data management industry. The secret to this success? (slight pause) {CLICK} a single, scalable platform, engineered for innovation that is continuously improving and evolving, and a proven heritage of anticipating & addressing emerging data management needs. {CLICK} The combination of one virtual data repository combined with a single universal index and highly automated management and operations framework means you can handle the challenges of data growth, data velocity, increasing regulatory and governance requirements and extracting more value out of your data by activating it. The Commvault platform has all of this native functionality built-in, ready to be enabled at any time. This means a customer can choose to address a single data management challenge today or at the other end of the scale - replace up to 20 individual products with their dedicated infrastructure and siloed data repositories. This enables our customers to actually reduce operational costs, shrink their administrative burden, while scaling their data management to meet never-ending growth.

3 Only New Blocks Transferred Hash References Recorded in DDB
REPLICATION OF DEDUPLICATED DATA DASH Copy Enables transmission of data in deduplicated reduced form between Media Agents Reduction in bandwidth consumption facilitates disaster recovery Eliminates need for vendor-specific array replication for DR B A B C C D B C D D E Only New Blocks Transferred {Auto build with motion paths- as it was covered in an earlier module, no need to specifically address the animation, just talk over it.} As was discussed in an earlier module, DASH copy is a technology that enables the transmission of data in its deduplicated, reduced form factor between media agents This reduction in bandwidth consumption facilitates disaster recovery, and also eliminates the need for vendor specific array replication for disaster recovery purposes. Hash References Recorded in DDB

4 VIRTUAL SERVER AGENT FOR AZURE
Expanding Capabilities Agent-less backup of an Azure VM Classic & ARM (Azure Resource Manager) support Granular file-level recovery Cross-hypervisor restore options planned

5 MICROSOFT OFFICE 365 O365 Integration O365 Limitations
Leverage OnePass™ collection Cost effective long-term retention Enterprise Search Access to data in case of internet outages O365 Limitations Litigation preparedness Lack of granularity in retention/disposition Federated search and e-Discovery Storage and other “hidden” costs Offline issues “Office 365 archiving capability does provide many basic archiving capabilities, but does not meet the additional eDiscovery and regulatory requirements with which many organisations are faced.” Osterman Research (Building a Case for Third Party Archive, 2015)

6 ACCESSING EXCHANGE DATA
Web Console Mobile Access Outlook Outlook Web App IMAP Let’s start out by discussing the different ways that a user can access their exchange mailbox data with Commvault® software when leveraging OnePass™ technology. There are five primary methods available for access. Protected and archived messages may be accessed via Outlook with either an Outlook plug in or via a content store mailbox, they may also be accessed via OWA, the Web Console, the Commvault mobile application or finally from any IMAP compatible device.

7 CONTENTSTORE MAIL End User Access to Data from within Outlook with a Native Folder Structure and Message Capabilities (e.g. preview, open, forward, reply, search) Integrated with Outlook Self-Service Data Access Primary Mailbox Efficient Restores Content Store Mail Exchange Commvault OnePass™ ContentStore mail is a capability that provides a number of advantages over traditional exchange archive access methods. Because of the intuitive nature of ContentStore mail, little or no End User training is required One item to note is that content store mail requires Content Indexing and the Outlook Add-In

8 THE GENERAL DATA PROTECTION REGULATION (GDPR)
Users have rights over their data1 and they must give their consent to: Store it (they also have the right to request that it is corrected or erased) Process it (they also have the right to stop it being used) Organisations must: Document what data they have, what they do with it, who it’s shared with, … Do everything possible to avoid a data breach2 If a breach occurs, that could have a negative impact on an individual (such as identity theft3), they must notify the individual (so they can minimise any likely damage) and the authorities within 72 hours FINES UP TO 4% OF GLOBAL ANNUAL TURN-OVER OR 20 MILLION EUROS (WHICHEVER IS HIGHER) FOR EACH BREACH OR FOR NON-COMPLIANCE Applies to any personal data4 stored on EU citizens and it comes into force 25 May 2018 A data breach is a security incident in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorised to do so Identity theft occurs when someone uses another's personally identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes Other Personally Identifiable Information (PII) or Sensitive Personal Information (SPI) information includes DOB, address, address, previous addresses, mother’s maiden name, the place where you were born, pin number, bank account details, national insurance number and passwords Personal data is any information relating to an individual, whether it relates to his or her private, professional or public life - it can be anything from a name, a photo, an address, bank details, posts on social networking websites, medical information, or a computer’s IP address It is not just the Commvault Software platform that keeps us leading the way in data management. {CLICK} Commvault is proud to boast the best enterprise software in the industry by a single global team, resulting in greater customer intimacy. A Proactive philosophy means customers are made aware of problems before they happen, and problems are resolved before they occur. This saves time, lowers risk and costs, and increases peace of mind. Our experienced consultants reveal new ways to make a customers data a powerful strategic asset. We provide transformational insights that align to each specific business and how they gather, retain and employ data. APIs and workflows enable our team to automate and make strategic recommendations, ensuring immediate and sustainable customer value. Commvault Education services Significantly increase self-sufficiency and productivity with a Full coverage curriculum and 3 tier Certification program delivered globally. Finally, We test, architect and jointly develop solutions with the leading cloud and virtualization, storage and infrastructure, and enterprise application providers globally — to deliver more capable and complete solutions to the customer.

9 GDPR’S IMPACT ON IT AND HOW COMMVAULT CAN HELP
Take all reasonable endeavours to prevent a data breach (i.e. review use of encryption, firewalls and IDS/IPS, and review security policies including access rights, etc.) Retain data for the minimum amount of time - once it’s of no use delete it from all tiers (production, backup and archive) Content index all tiers of un-structured1 data across endpoints, data centres and cloud Identify any Personally Identifiable Information (PII) or Sensitive Personal Information (SPI) and pro-actively erase as soon as possible Upon request perform key word searches (i.e. for an individual’s name) across all tiers Export data and send it to the individual Correct any errors and provide the updates to anyone that the data is shared with Erase the data and maintain an audit log of the action Report any breaches that involve any PII or SPI data If the exact details of the data are not known restore it and review DEVELOP A COMPREHENSIVE DATA PROTECTION, COMPLIANCE AND DISCOVERY STRATEGY WITH COMMVAULT It is not just the Commvault Software platform that keeps us leading the way in data management. {CLICK} Commvault is proud to boast the best enterprise software in the industry by a single global team, resulting in greater customer intimacy. A Proactive philosophy means customers are made aware of problems before they happen, and problems are resolved before they occur. This saves time, lowers risk and costs, and increases peace of mind. Our experienced consultants reveal new ways to make a customers data a powerful strategic asset. We provide transformational insights that align to each specific business and how they gather, retain and employ data. APIs and workflows enable our team to automate and make strategic recommendations, ensuring immediate and sustainable customer value. Commvault Education services Significantly increase self-sufficiency and productivity with a Full coverage curriculum and 3 tier Certification program delivered globally. Finally, We test, architect and jointly develop solutions with the leading cloud and virtualization, storage and infrastructure, and enterprise application providers globally — to deliver more capable and complete solutions to the customer. Includes files, s and SharePoint (the same applies for structured systems, but in general they have native search and erasure capabilities)

10 GOING BEYOND THE SOFTWARE PLATFORM
AWARD WINNING CUSTOMER SUPPORT 97% customer satisfaction rating STRATEGIC ALLIANCES UNLOCK UNIQUE VALUE Technology Partnerships with Industry Leaders INDUSTY-LEADING CONSULTING SERVICES 95% of customers are likely to recommend Commvault Consulting BEST-IN-CLASS EDUCATION SERVICES 93% of trained customer indicate positive impact on job success It is not just the Commvault Software platform that keeps us leading the way in data management. {CLICK} Commvault is proud to boast the best enterprise software in the industry by a single global team, resulting in greater customer intimacy. A Proactive philosophy means customers are made aware of problems before they happen, and problems are resolved before they occur. This saves time, lowers risk and costs, and increases peace of mind. Our experienced consultants reveal new ways to make a customers data a powerful strategic asset. We provide transformational insights that align to each specific business and how they gather, retain and employ data. APIs and workflows enable our team to automate and make strategic recommendations, ensuring immediate and sustainable customer value. Commvault Education services Significantly increase self-sufficiency and productivity with a Full coverage curriculum and 3 tier Certification program delivered globally. Finally, We test, architect and jointly develop solutions with the leading cloud and virtualization, storage and infrastructure, and enterprise application providers globally — to deliver more capable and complete solutions to the customer.

11 WHO SAYS WE’RE A LEADER? GARTNER DOES. SIX TIMES IN A ROW.
Gartner: 2016 Magic Quadrant for Enterprise Backup Software and Integrated Appliances This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner’s analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. A complimentary copy of the complete Gartner report is available through the Commvault website. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. For the 6th consecutive year, Commvault has earned a leadership position on Gartner’s Magic Quadrant for Enterprise Backup Software and Integrated Appliances. This is a validation of our market leadership, innovation and ability to execute in an extremely competitive industry. It is a testament to our consistency, reliability and ability to adapt in a constantly changing industry. In our opinion, this positioning continues to validate Commvault’s approach to backup and recovery software and appliances. It also highlights our success in providing modern data management solutions to Enterprise customers worldwide. While the report is focused on evaluating backup and recovery solutions, Gartner recognizes Commvault’s extensive product portfolio and leadership in other areas stating, “looking beyond basic backup, Commvault's portfolio offers the ability to mine and repurpose backup for test/development, analytics and disaster recovery, as well as public cloud integration that offers the same rich set of data services.” {CLICK} You can see the full report by clicking through this link. See full report through this link.

12 THANK YOU


Download ppt "COMMVAULT OVERVIEW."

Similar presentations


Ads by Google