Presentation is loading. Please wait.

Presentation is loading. Please wait.

Desktop and Laptop Protection Discussion

Similar presentations


Presentation on theme: "Desktop and Laptop Protection Discussion"— Presentation transcript:

1

2 Desktop and Laptop Protection Discussion

3 Critical Business Data Is Exposed
60% of intellectual capital resides outside of the data center on employee desktops and laptops Protection from data threats is necessary for uninterrupted business Companies implement ad-hoc protection methods because stand alone products are are cumbersome and expensive Server Protection Desktop and Laptop Protection Disaster Recovery Plans Security/ Compliance Today’s IT managers are faced with a challenge when it comes to protecting the data on desktops and laptops. It becomes increasingly challenging to implement a reliable solution because data is growing at exponential rates and is on the move with busy executives, road warriors and remote or mobile offices. In the past protecting data on desktops and laptops was straight forward because all data was housed within the walls of the data center. Today companies are faced with the fact that as much as 60% of all critical or intellectual data resides with the employees and may or may not be protected. Loss of data or employee downtime from viruses, user error, theft or hardware failure can be crucial to a business success and therefore uninterrupted business becomes a requirement. Some companies try to put ad-hoc methods in place to try and protect data but are unsuccessful in enforcing such policies or maintaining the current-ness of the data. The majority of companies (our research shows 55%) have an ad-hoc policy of having users back up their data to a network share. In the list of items that IT needs to accomplish this becomes a checkbox without a permanent check while other items that are equally as important are given full attention. *Source: IDC, Business Continuity in 2002: It's Not Business as Usual, April 2002

4 What A Solution Should Do
Automate existing policy Users backup to a network share Integrate into existing IT infrastructure Lowering total cost of ownership Require low administrative maintenance and minimal IT interaction with employees Support the needs of desktop, laptop and home/remote office employees Enable users to initiate their own files restores To solve the IT problem and protect employee data corporations should implement a data protection strategy for desktops and laptops that leverages existing policy of backing up users to a network share. Also being able to build upon already existing infrastructure for server backup can lower the total cost of ownership and the administration needed to support the solution. In addition, being able to provide different methods of backup modes to support the wide range of users and having users able to restore their own files is important.

5 Current Solution NetBackup Professional 3.6
Stand-alone data protection product for desktops and laptops running Windows Disk-to-disk offering with a server to client architecture Launched 4 years ago The current product meets some customer needs To continue to lead the market, from market research and customer feedback we have designed and built the next generation of desktop and laptop products for VERITAS Only use this slide if the customer is looking at NBUP, aware of NBUP or has NBUP. This is the lead in slide to say this is what we’ve had in the past, it wasn’t meeting customer needs and so we have created the next generation of protection for desktops and laptops.

6 What Have We Learned? What is the future?

7 Barriers to Purchase for Existing Market and Solutions
Difficult to establish value for stand-alone product IT is focused on server protection products Do not want separate data protection products for servers and desktops/laptops Entrenched Policy Important data is on or should be on the server and the user is responsible to put it there “Show me how to enhance current policy Not replace it” Established Infrastructure Do not want to invest in new single purpose infrastructure Willing to add not replace Some of the feedback that we heard from customers and our research was that stand alone products on the market are hard to get implemented because of the following areas. We drill down into what customers want in the next couple of slides.

8 What is the Existing Policy?
“What is your primary policy for protecting user data on client PCs” Transition from targeting less than 6% of the market to targeting 81% of the total available market NetBackup Pro, Connected, Altiris, et all Backup Exec and NetBackup Based on our research we found that over 50% of customers utilize existing network shares for users backups because of the issues presented on the previous slide. The market for the NBUP and Connected’s of the world is 6%, this doesn’t really make the revenue large enough for VERITAS to go after. March 2002, 334 responses

9 Next Generation To continue to lead the market, from market research and customer feedback we have designed and built the next generation of desktop and laptop products for VERITAS Read as is, introduces the new option.

10 The Desktop and Laptop Option
Data Protection Provides continuous disk-based protection for the critical data on desktops and laptops Synchronization Keeps files on multiple desktops and laptops synchronized, allowing data to remain “in-place” where users need it Simple Administration Single, centralized console keeps administration to a minimum Profiles allow for simple management of user groups and backup parameters Enhanced .PST Handling Delta File Technology will only send the changes to the .pst on a daily basis at the file level, commanding greater efficiency To solve the IT need for a reliable data protection solution that encompasses the desktop and laptop data, VERITAS introduces the Desktop and Laptop Option. The Desktop and Laptop Option not only provides data protection in a new continuous mode that will protect users whether they are in the office or on the road but it introduces something new to this space, Synchronization. Synchronization allows users with multiple machines to synchronize their data in-place or where they need it; similar to how a Palm Pilot synchs with a computer. To help with the total cost of ownership the Desktop and Laptop Option utilizes existing hardware, storage and personnel, making the implementation and deployment of the solution fast and easy. A single console allows for at-a-glance management that the Administrator will need to view once a day to ensure operations are running smoothly. In addition, the Desktop and Laptop Option manages thousands of users via profiles, which allow the Administrator to segment users however they like (by workgroup or department for example), assigning backup parameters such as including/excluding files, setting maximum amount of storage used and schedules to ensure the operation runs smoothly. Lastly, we have enhanced our ability to handle .pst (personal outlook folders, those sitting on the hard drive) files. Instead of treating the .pst as one large file it is considered a series of files or individual mail messages. On a daily basis the desktop and laptop option will only backup the changed mail messages.

11 Desktop and Laptop Option Benefits
IT Managers don’t have to worry about unprotected data Protection occurs continuously, online to network storage or offline to the local hard drive Tailored to meet the special needs of laptop users Users have full access to all of their data Synchronizes data between desktops and laptops, data resides where the user needs it, designed for executives Integrates into existing IT infrastructure and policies, lowering TCO Automates existing policy of having users copy data to existing network storage Flexible, lightweight design with no large database or application to manage Limits IT Interaction with users, improving ROI Users can restore their own files from network storage or local disk without intervention Helps ensure regulatory and audit compliance The benefits with the Desktop and Laptop Option are pretty straight-forward they are… (read the slide).

12 How It Works – Data Protection
Desktop at HQ Desktop and Laptop Option on Backup Exec or NetBackup Tape Drive (or other storage media) DOC Laptop on the Road PDF Desktop at Local Office Here is an example of how the Desktop and Laptop Option Data Protection works. The Desktop and Laptop Option provides protection for users whether they’re in the office or on the road. The Desktop and Laptop Agent resides on each individual desktop and laptop and facilitates the copy of files to a file server or network share via a Backup Exec or NetBackup server. Once the data is stored on the file server it can be easily added to the Backup Exec or NetBackup server backup rotation to ensure that the data is safe in case of disaster on the appropriate tape drive or other media. DOC DOC PDF XLS PDF XLS XLS

13 How It Works – Synchronization
Desktop at HQ Desktop and Laptop Option on Backup Exec or NetBackup Tape Drive (or other storage media) DOC Laptop on the Road PDF Desktop at Local Office Here is an example of how the Desktop and Laptop Option Synchronization works. Synchronization allows for users with multiple machines to access any of their data regardless of which machine they’re working on. In this example we see the DOC go to the File Server from HQ and the PDF to go to the file server from the Road. When the user is at the Local Office they can access both the PDF and the DOC by way of accessing their data from the file server. DOC DOC PDF PDF

14 Key Features Administrator’s can utilize the management dashboard for a daily summary of operations Flexible scheduling, 4 modes: Continuous, Periodic, Scheduled and Manual Non-intrusive “yield” backups allow users to work uninterrupted Uses existing network storage/shares to store user data Profiles provide a quick way to segment users and set backup parameters A quick import of existing users and their storage designations makes installation easy Supports LDAP and AD Supports Windows 2000 and XP desktops and laptops Compatible with SAN/2000 NAS/SAK NAS These are additional points of feature/function within the product that should be driven home with the customer, to ensure they know the product’s full capabilities.

15 View the Desktop and Laptop Option
The following section contains a few screen shots to provide your customer with an idea of what DLO looks like.

16 Screen Description Once DLO is installed and configured you start out at the Overview page in DLO. This gives a status of operations and alerts to problems. VALUE The value of this is that the Admin comes here once a day to check on the status of operations to make sure everything is running smoothly and that there are no problems with the solution. The beauty of this product is the “trivial” administration aspect where as the admin is suppose to spend very little time managing the product.

17 Screen Description Now that we have selected the Import Users Option from the DLO File Tree we see the Import User Wizard. This starts the process of importing users. The purpose of this screen is to show the product has this capability and to talk to it without actually going through the wizard and setting things up. Value This slide builds up the story that DLO fits into a company’s existing infrastructure. By being able to take users that are already using existing network storage and importing them this provides a simple way to deploy the product to large groups without having to set anything up. Here again is a good example of “trivial” administration.

18 Screen Description: All users must be placed into a profile
Screen Description: All users must be placed into a profile. This slide shows a list of Profiles (see revisions) with the Default Profile highlighted. Value DLO comes with a Default Profile which has the recommended backup parameters already set to achieve the most efficient backups. The value here is that the profile parameters can all be seen at a glance and easily adjusted based on the company’s needs and the admin’s desired level or protection and schedules. Note the Schedule is set to run backups “Whenever a file changes.” This is continuous mode backup and is a new feature we gain with DLO, every time the user saves a file it is automatically uploaded and stored on the server.

19 Screen Description: This is the individual user interface for the desktop or laptop user. This is the status screen which tells the user what is happening with their backups. Value This is a simple screen that will be intuitive to end-users. They can initiate backups, do synchronization and restores from here.

20 Summary Customers need Data Protection for Desktops and Laptops
Introducing a new, integrated option to meet customer needs The Desktop and Laptop Option Provides Data Protection and Synchronization Utilizes existing IT infrastructure, policies and storage User can retrieve their own files Management is simple through profiles and wizards Current customers of NetBackup Professional on maintenance have full recourse

21 & QUESTIONS ANSWERS

22


Download ppt "Desktop and Laptop Protection Discussion"

Similar presentations


Ads by Google