Professional Documents
Culture Documents
Confidential
Agenda
IT Modernization
What Does IT Mean
Key Attributes
Confidential
State of IT Infrastructure
Aging Infrastructure, Greater Density plus More Data
Average Age of Hardware Slower
Slower HW
HW refresh
refresh rates
rates over
over past
past 24
24
months
months
Need
Need to
to accelerate
accelerate to
to catch
catch up
up with
with
pace
pace of
of change
change
2006 2007 2008 2009 2010 2011 2012
Greater
Greater infrastructure
infrastructure density
density
managed
managed by by fewer
fewer people
people
Server
Server virtualization
virtualization is
is aa key
key
accelerating
accelerating force
force
24
24 xx 77 availability
availability means
means less
less
downtime
downtime
2006 2007 2008 2009 2010 2011 2012
Confidential
IT Modernization What Does It Mean?
Gartners Definition
A movement toward specific best practices and strategies for moving toward an
application and infrastructure environment that leverages recent advances in
hardware and software.
Confidential
Key Objectives of IT Modernization
Confidential
IT Modernization Drivers
Everything Just Increases Data, Complexity, Scale
Fewer IT Personnel
Confidential
Data Management Modernization Drivers
Impact on IT and Lines of Business
Smaller
Smaller Operation
Operation Windows
Windows to to Excessive
Excessive time
time and
and effort
effort on
on
handle
handle ever
ever more
more data
data unsupported
unsupported apps
apps and
and systems
systems
Recovery
Recoveryisis Job
Job #1
#1 new
new Seamless
Seamless transition
transition and
and rollback
rollback
paradigm
paradigm vs.
vs. old
old Backup
Backup focus
focus protection
protection for
for upgrade
upgrade && migration
migration
IT
ITlabor
labor stretched
stretched beyond
beyond limits
limits
SLAs
SLAs slipping
slipping asas workloads
workloads grow
grow
with
with less
less && less
less value
value to
to LOB
LOB
VM
VMsprawl
sprawl puts
puts data
data and
and VM
VM
infrastructure
infrastructure at
at risk
risk Very
Verydynamic
dynamic
Critical
Critical Data/Apps
Data/Apps now now virtual
virtual
and
and unprotected
unprotected
Escalating
Escalating cost
cost of
of primary
primarydata
data
Chain
Chain of
of copies
copies Recovery,
Recovery,BU,BU,
DR,
DR,Archive
Archive drive
drive 7x
7x 10x
10x volume
volume
Confidential
Data Management Challenges
Confidential
Traditional Modernization Options
Introduce the Latest Generation to Address Pain
Deduplication Appliance
Compliance
Access
Faster, Dedicated Network
DR Search
Recovery
Enhanced
Enhanced Storage
Storage Array
Array SW
SW
Application Records
specific
Multiple
Multiple Virtualization
Virtualization Solutions
Solutions
Confidential
Traditional Solutions
Trying to Solve Todays Complex Problems with Complex Solutions
puredisk
Acquisition
Backup Replication Archive Migration Appliances
Hardware
People
- Lauren Whitehouse
Analyst, ESG
Confidential
Who is CommVault?
HQ in Oceanport, NJ
1,100+ employees worldwide
> 12,000 customers
Global sales, service and support
Highest customer satisfaction rate in the industry
Publicly traded on NASDAQ:CVLT
Confidential
What Solutions Do We Offer?
Focused on Data & Information Mgmt
Differentiated Vision Merge Data and Information Management into one Platform
Data Management Protection, Replication, Archiving, Reporting and Automated Discovery
Information Management - Content Indexing, e-Discovery, Records Retention, Information Access
Info
Info Management
Management
Search
Search e-Discovery
e-Discovery Records
Records Access
Access
Data
Data Management
Management
Discover Report
Discover Report Replicate
Replicate Backup
Backup Archive
Archive
Common
Common Platform
Platform
CONSOLE POLICY
CONSOLE POLICY SECURE
SECURE JOB MGMT REPORT
JOB MGMT REPORT ALERT
ALERT CLASSIFY
CLASSIFY
COMPRESS ENCRYPT
COMPRESS ENCRYPT DEDUPE
DEDUPE CONTENT
CONTENT VERIFY
VERIFY TIER
TIER EXPIRE
EXPIRE
INDEX
INDEX
Virtual
Virtual Repository
Repository
Confidential
Traditional Approach to Data Protection
8 AM 12 PM 4 PM
RECOVERY TIER (Array-based
Snapshot)
Backup SW & UI
- Transitory fast recovery copy
- Start of Disaster Recovery chain
MA
Cloud Vendor UI
PROTECTION TIER (Disk or Tape)
- Persistent Protection Copy, less useful COMPLIANCE TIER (Disk, Tape,
for recovery Cloud)
- Starting point for long term retention - Long Term Retention, Off Site
CLOUD
TAPE
Confidential
Modernized Approach
Data Mgmt
MA
SW & Single UI
Confidential
Modernized Data Protection
Simple, Smart, Recovery & Access Focused
Dynamic Data
Effortless Scale
(Reactive/ sprawl)
DB Production Up
Stores
Recover Access
Data Store Data Store
2 TB 2 TB
Recovery Focused
Simplify recovery &
(Simple: Whole / Items)
RPO/RTO assure data access
<4hrs
SnapCopies
Rapid/Low Impact Reduce resource
(Offload processes) Short Retention, Restore, Search Variable Retention needs across all
Backup Copies
Tiers
DR Copies
Smart movement
dedupe to everywhere Unshackle licensing >
Long term Deep Retention, Discovery Pay On Usage
(Efficient, fast)
Vault Copies
Confidential
Modernized Virtual Protection
Scaling-Up while Collapsing the Backup Window
1
Auto-Discovery: (control sprawl )
1
VM Server Pool
VMFS (VMDK)
Recovery Ready: (offloaded to virtual client
3 on ESX proxy)
8 hr Persistent HW
16 hr
VMDKs on VMFS Snapshots
containing Rapid Daily Backup Copy: (zero impact on
Storage
24 hr
Recovery VM 4 production tier VMs or ESX hosts)
Data Store Pool
SAN/NAS Images
VMFS (VMDK)
Confidential
CommVault Simpana 9
Revolutionary Technology to Help IT Modernize
Confidential
Data Protection Modernization
Key Requirements for Success
Key Requirements
for Protecting
information in Next
Generation IT
Infrastructures
Scale with Performance Efficiency & Data Reduction Automation & Reporting
5,000+
Virtual &
Physical
Clients
Confidential
CVLTs Data Mgmt Modernization Solution
Confidential
Simplifying Legacy Site Migrations
Same client/policies/schedules names reducing change mgmt
Confidential
Summary
IT Modernization Drivers
Environment Challenges
Confidential
Summary
What do you do about it
Confidential
Thank You
Confidential