Presentation is loading. Please wait.

Presentation is loading. Please wait.

Reclaim control of mobile and distributed data

Similar presentations


Presentation on theme: "Reclaim control of mobile and distributed data"— Presentation transcript:

1 Reclaim control of mobile and distributed data
January 13, 2016 Hello everyone. Today I want to share with you some trends going on in the market which may be familiar to you and your company, and tell you a little bit about Druva helps organization solve for these challenges.

2 About Druva Company Headquartered in Silicon Valley
3,000+ Customers around the globe Backed by Sequoia Ventures Multiple awards for data protection and governance “Druva has been a phenomenal answer to Dell for protecting our data” Brad Hammack IT Emerging Technologies Druva is a fast growing company fueled by the needs of our customers to protect their growing data at the edge of their enterprise We did this by creating an innovative technology platform that has been recognized by the industry as best-in-class for our customers We’ve gained significant presence with leading companies, over 3,000 for the unique way we address their challenges Our solutions have won multiple awards and have been acknowledged by companies like Dell for our abilities

3 We’re also proud of the fact that we’ve received the top marks for the 3rd time in a row in Gartner’s recent Critical Capabilities report, where we received the highest Score for Overall Use Case In a Comparison of 8 Vendors Across 11 Key Capabilities – for the 3rd time running— with highest scores in six of the 11 categories.

4 data moves to mobile Devices
70% 3.3 >30% Mobile workforce devices – BYOD policies Data resides on endpoints Dispersion of data to mobile devices was the first wave of data moving outside the enterprise The big challenge companies are facing is data going mobile and how to manage and have visibiuty of that data. Over the past 10 years, we’ve seen the dispersion of data to mobile devices– this is the first wave of data moving outside the enterprise Use now have multiple mobile devices and data is spreading as end users become more productive. That means the way they interact with data us changing through apps and tools. Data is in the hands of end users , in the field. First Wave of Data Sprawl to Mobile Devices – Advent of BYOD policies Currently, 57% of the global workforce works from multiple locations in a given week, and 28% of corporate data is stored exclusively on laptops, tablets, and smartphones (Forrester). Company data is moving outside the corporate firewall at a rapid pace, and that trend is only going to continue. IT managers need to maintain control of that data anywhere, and at all times. Source: IDC Research

5 Data spreads to cloud services
50% Enterprise data will be exclusively on endpoints & cloud by 2020 Today, data is moving to the cloud through applications and services being used (office 365, Box, Google Apps, Dropbox), and we see this as the second wave of data sprawl. And this is really the increasing pressure our customers are facing. The landscape of IT management is changing. Recent studies show that in the next five years, IT departments can expect to see a marked expansion in quantity and types of data, and more employees accessing company data from their personal devices and on networks outside the corporate firewall.

6 Confidence & control no longer exist
High risk of permanent data loss Business continuity & end user productivity impact Lost visibility for compliance & legal requirements 8% 26% $53k Enterprise devices lost per year Litigation includes data from mobile devices Cost of losing end-user information What this results in is a loss of control and confidence. Do you know where your data is and how to handle loss or exposure? Does IT have the ability to manage and react? Once outside the firewall, IT loses control of corporate data —without IT control, anything could happen to that data. Some examples: A user's smartphone could be hacked while connected to a public Wi-Fi network, someone could spill coffee on his company-supplied laptop, or an employee might leave her tablet behind in a public place. When a device is lost, stolen or fails the business is impacted by both a loss of productivity of its users as well as permanent loss of data that could negatively impact the business. Additionally, the enterprises loss of visibility to this data also impacts the businesses ability to respond to compliance, investigation or litigation requests, and increasingly we’re seeing this data subject to these types of requirements. The reality is, in today’s environment, not knowing where a company’s sensitive data has become an increasing threat to organizations.

7 …And the problem is increasing
65% Of data breach incidents come from within the company We’re seeing more of this in terms of data exposure and loss. The downside of loss of visibility and control is the increase in data exposure which we hear about regularly. It’s not just the breach incidents that hit the headlines, typically driven by external hackers, but the 65% or more incidents that occur from inside the company; Miscellaneous errors – 29.4% - Simply, any mistake that compromises security: which may mean posting private data to a public site accidentally, sending information to the wrong recipients, or failing to dispose of documents or assets securely. Insider and privilege misuse – 20.6% - This is mainly by insiders misuse, but outsiders (due to collusion) and partners (because they are granted privileges) show up as well. Potential culprits come from every level of the business, from the frontline to the boardroom. Physical theft and loss – 15.3% - The loss or theft of laptops, USB drives, printed papers and other information assets, mostly from offices, but also from vehicles and homes And, companies are regularly being fined millions of dollars for not exercising the proper controls to ensure sensitive data is protected. This ranges from stolen laptops to an incident like ATT where a group of insiders were storing customer PII (Personal Identifiable Information) and then selling the data on the black market. And it’s the mix of these challenges that our customers are facing that utilize our system to get out ahead of the problem as best as possible. Source: Verizon 2015 Data Breach Investigation Report & Statista 2014

8 Stay on top of end user data where it resides
Visibility across mobile and cloud services At-rest risk identification Transparent collection and archiving User activity audit trails Forensic handling for legal needs Without impacting end user productivity You need to stay on top of the data wherever its going. The old way was ‘command and control’, but we all know that end users are going where the they will be most productive. So IT needs to get ahead of this challenge requires taking a different approach to how you manage data in today’s environment For many organizations the approach of centrally managing data in a content system and having tighter reins around data have been broken down by the new data landscape What’s needed is a way to achieve those same types of controls in a distributed way, going to where the data resides and understanding its value and taking action from there, without impacting end-user productivity, which has been Druva’s focus as a business, to enable organizations to accomplish on their data <bullet list on slide>

9 Shire stays ahead of data sprawl
Challenges: Data sprawl across end user devices and servers IP and research data untraceable for governance High costs to collect / preserve data for litigation purposes Results: Increased visibility into data and quick access to data for compliance and recovery Reduced support costs for data recovery Beyond back up, opens up efficiencies in eDiscovery and managing data lifecycle “We manage the full lifecycle of data across time, device and geography. Druva is a key capability to make this possible.” A real world example of a typical customer faced with this challenge is a company like Shire Pharmaceuticals, who as a progressive drug innovator that deals with a distributed workforce, but even with strong data process still has concerns over data leakage and data moving away from controlled environments. Additionally, like any regulated business, legal suits are fairly common and identifying, collecting and handing data over to legal teams was becoming very expensive and time consuming due to the distributed nature of the data By implementing a solution like Druva they were able to increase their data visibility significantly, as well as address their compliance and legal needs, with minimal to no impact to their end users

10 PWC Empowers their Mobile Workforce
With a highly mobile workforce, PwC experienced frequent data loss, severely impacting employee productivity. inSync solution: “Druva is perfect for the enterprise that needs an effective backup solution for its mobile users.” — Rajesh Kumar Sharma Assistant IT Manager PwC Cross-platform backup for laptops and mobile devices Non-intrusive end-user experience Centralized management End-to-end enterprise-grade security Integrated data loss prevention and file sharing Another well-known company, PWC, as you can imagine has a highly distributed workforce carrying client information. Data loss for them can have a significant impact on customer engagements as well as employee productivity By utilizing Druva they were able to protect the data from permanent loss, as well as provide immediate access to information in the case of a lost or damaged system.

11 data center class Availability & governance for the mobile workforce
Data Availability Data Governance Druva is helping organizations reclaim the control they lost when data moved out of the data center. Druva is the leader in converged data protection. It helps return control to organizations by bringing data center class availability and governance to the mobile workforce. Built on a single platform, Druva’s solutions address the data availability needs of organizations such as backup and restore, archival, and access and sharing. In the same solution, it helps organization better control their mobile data with governance capabilities that include search and audit, compliance and the ability to set a Legal Hold on data. Druva extends beyond just collecting data from mobile devices to also include cloud services, like Office 365 to ensure business have a 360 degree view of the new end-user data world.

12 The druva difference Natively built on cloud technologies
ITAR FIPS 140-2 MPAA ISO 27001 SOC 1,2,3 ISAE 3402 PCI DSS HIPAA FISMA Moderate 30+ Selectable Storage Regions The druva difference Natively built on cloud technologies Data Governance File Search & Analytics Legal Hold & eDiscovery Support 99.999% data durability Compliance Monitoring & Auditing Patented deduplication engine 80% bandwidth and storage reduction Data Availability Data Backup & Recovery Device Refresh & OS Migration Secure Access & Sharing Security & Privacy Framework Single data store, multiple workloads Global Deduplication Engine Time- Indexed Metadata 100% elastic, proven scalability Druva Elastic Cloud Full-text Indexing Advanced cloud security & privacy Zero vendor data access S3/Glacier (Storage) DynamoDB (Database) EC2 (Compute) Azure Blob OrionDB Compute Druva is unique in the way we approach these challenges, something our founders recognized early on in developing our core architecture. Whether you deploy on-premise or in the cloud the system is designed to efficiently handle massive amounts of data. <AWS and Azure> Firstly, Druva is built on native cloud technologies utilizing the power of the public cloud - Amazon Web Services (S3, DynamoDB, EC2), and Microsoft Azure, the two highest rated and most secure infrastructures available. Our customers can leverage any of AWSs 11 regions, and many of our global customers use multiple regions for addressing data residency/privacy regulations; for example in Germany. <Elastic Cloud> Our founders recognized that the classic model of backup/restore became increasingly inefficient as more data was being stored and companies wanted to utilize there data for other purposes; archiving, ediscovery, data monitoring or data mining. To address this Druva created a time-index file system, which serves as the core of our technology stack, that enables data to move in/out and be utilized by the system in real-time. A key component designed into this to enhance this speed, both within the services and on mobile devices is our global deduplication technology that provides up to 80% bandwidth and storage reduction, very lightweight on endpoints and provides greater overall system performance on large data sets; handling multiple petabytes in the cloud today. <Data Availability> The advantage of this is that multiple data use-cases can be addressed all within a unified system. Backup/recover, file sharing, immediate restore/recovery, DLP, etc… as well as <Data Governance> data governance capabilities; auditing, legal hold, our recently announced data monitoring and alerting capability called ‘proactive compliance’, and direct ediscovery system handoff. <security + privacy> As part of the complete stack has also been caerfull attention to both data security and data privacy requirements, which include both regional separation and controls and our unique two-factor encryption model that ensures that Druva cannot access your stored data under subpoena, warrant or court order; something especially important to our global clients operating in regions such as Germany.

13 Trusted by 3,000+ Global Enterprises
Druva’s customers cover a broad range of industries; retail, manufacturing, healthcare, technology companies to name a few, many well known brands – and the solution is typically deployed on a company-wide basis – for example Pfizer has over 70,000 devices utilizing our cloud solution. The commonality between these businesses, like most today, is they have an increasingly complex environment of end-user devices and a growing collection of cloud services that are compromising their ability to protect and govern their data accordingly.

14 Key takeaways A comprehensive and integrated solution is required such that it: Enables a single access point for viewing and managing end-user data without having to manually access separate data sources Allows organizations to adhere to corporate data policies, industry data regulations, and legal obligations Enables data storage for long-term archiving purposes regardless of source Does not compromise on your employees productivity To wrap up, the main challenges we are trying to help organizations solve are around this issues of distributed data. We provide a way for organizations to have a single access point and visibility to be able to protect and recover their data, as well as meet industry regulations and compliance concerns and move that visibility out to this new perimeter of data. Addressing data storage, recovery and data access, and without impacting employee productivity so that the company gets the benefits of comprehensive data protection and governance.

15 Experience the Druva Advantage
for Enterprise Infrastructure for Mobile and Cloud We invite you now to visit the booth to see inSync and Phoenix in action. Thanks for your time! inSync: For endpoints Druva’s flagship and #1 rated data protection solution, inSync addresses your mobile workforce and ensures data is protected from loss and is easily recoverable in an emergency Phoenix: For remote office servers, Druva Phoenix unifies backup and archiving, to enable organizations to centrally manage their data, Phoenix provides backup to the cloud 20x faster than other solutions at a significantly lower TCO than previous solutions With inSync & Phoenix, Druva is able to provide a wide breadth of solutions for organizations tackling the data at the edge challenge – from bakcup/recovery to Data Loss Prevention, enabling organizations to manage large scale OS migrations and device-refreshes, file-sharing, managing for compliance and ediscovery requirements, and long term archiving and retention for data that needs to be stored for 10, 20, 30+ years.


Download ppt "Reclaim control of mobile and distributed data"

Similar presentations


Ads by Google