SlideShare une entreprise Scribd logo
1  sur  21
The truth in information.
Les enjeux et LaVision deVeritas sur la
protection des données
Herve Evonlah
Country Manager,
French Speaking Africa
Cell: +27763460669
The Digital Business Relies on Information
Always Available, Compliant, Relevant
Electronic
Supply Chains
Customer
Service
Personally
Identifiable
Legal /
Regulatory
Big Data/
Analytics
Mobile
Workforce
Digital
Workflows
IoT
Data
We Assume All Data isValuable. Forever.
© 2017 Veritas Technologies3
Data is the
new oil.”
Shivon Zilis
Partner, Bloomberg Beta
39%
Data Growth
average
growth
per year
StorageVelocity
9% faster
than we are creating individual files
2007 2008 2009 2010 2011 2012 2013 2014 2017 2018 2019
But,Why Don’tWeTreat itThatWay?
© 2017 Veritas Technologies4
33%
52%Dark
Data
ROT
15%Clean
We don’t have a clue
what most of it is.
The Global Databerg Report, 2016
Much of it goes untouched
and unleveraged.
Data Genomics Index, 2016
41%
less than
3 years
old
at least
3 years
old
2015
2014
2013
2012
2011
2010
2009
2008
2007
more than
7 years
old
But, we know a good chunk
should be deleted.
The Data Hoarding Report, 2016
On average, ITDMs keep
54%of the files they create
42% 28% 16%
Unencrypted
company
secrets
Embarrassing or
incriminating employee
correspondence
Sexually
explicit
material
ITDMs admit storing unfavorable items
on personal or company devices
ButThere Are Significant ChallengesToday
Poor Visibility
• Data is scattered, mostly unstructured, across heterogeneous systems
• No single source of truth to make informed decisions
Exposed to Risk
• Low visibility into what is being stored or accessed by users, backed up, retained
• Business risk from non-compliance, unplanned downtime, service interruption
$
Paying Too Much
• Storing everything, including old, redundant or irrelevant data
• Maintaining accumulated legacy infrastructure
Not Agile Enough
• Not developing new applications quickly enough
• Limited by traditional IT processes
L
Copyright © 2019 Veritas Technologies, LLC 6
THE PROBLEM
Organizations need a quick and
simple way to get value out of
data, while mitigating risk.
IT is Under Pressure from Multiple Directions
Hybrid Clouds
Need ability to reliably
migrate/failover workloads
seamlessly across Clouds as
needed
Open Source
Open Stack and Containers
being adopted by developers, but
need enterprise class ‘-ilities’
Big Data
Need to provide visibility into large sets
of unstructured data for business
decision making, monetization
Always On
Need to protect and preserve data at all
times, ensure it is available & recoverable
with no interruption to operations
Increased Regulation
Need to know where your data is, and
apply compliance policies consistently
Need to reliably store, protect and
provision enterprise data at scale
on choice of hardware
Security
IT
Copyright © 2019 Veritas Technologies, LLC.8
DELETION
Files or emails
get deleted or
corrupted.
AUDITING
Government
Industry
Medical
Insurance
GDPR
DATABASES
Rollback recovery
Corruption
Cloning (QA/Dev)
Testing
Malicious code
HARDWARE
FAILURE
Less likely with
modern hardware
but still an issue.
Clustering is not
backup.
DISASTER
A disaster may not be a
“big smoking hole”
Ransomware
Malicious attacks
Employee sabotage
Customer Business Challenge – Data Loss
Top Five Reasons to Back Up
Only a handful of customers will lose data from a natural disaster
Copyright © 2019 Veritas Technologies, LLC 9
THE SOLUTION
A unified Data Management
offering clear insight, targeted
protection and orchestrated
availability.
Copyright © 2019 Veritas Technologies, LLC 9
The Veritas Holistic Approach of Data Management
Capabilities
LEADER IN ENTERPRISE DATA
SERVICES
• ProtectALLYour Data at Scale
• Recover, Provision and Disaster
Recovery
• Intelligent tiering and retirement
• Ransomware Resiliency
• Scale-out and hyper-convergence
PROTECTION
AVAILABILITY
• 24x7 for mission critical
workloads
• HA & DR across on-prem,
virtual and cloud
• QoS and SLAs based on apps
INSIGHTS
• Visualization & Classification
• Reporting & Analytics
• Compliance & Governance
Copyright © 2019 Veritas Technologies, LLC 10
Protection: How itWorks
Copyright © 2019 Veritas Technologies, LLC
11
Unified Protection
Protect Data
At Scale
for the best data
protection solution
for any environment.
Hyperconverged
Open Source
Big Data Platforms
Virtual
Acropolis
Legacy
Cloud
Physical
Availability: How itWorks
0011101010010000111100101011010101010011101010010000111100101011010
0011101010011010100100000011101010110001110111010001111011011110110
Virtual Appliance:
Resiliency Mgr
Infrastructure Mgr
NetBackup
Custom
InfoScale
Enterprise
Virtual Appliance:
Resiliency Mgr
Infrastructure Mgr
Traditional Private
Cloud
0011101010010000111100101011010101010011101010010000111100101011010
0011101010011010100100000011101010110001110111010001111011011110110
VM
VM
VM
VMVM
VM
VM
VM
VM
VMVM
VM
VM
VM
VM
VMVM
VM
VM
VM
VM
VMVM
VM
Virtual Replication
Appliance
Virtual Replication
Appliance
Copyright © 2019 Veritas Technologies, LLC
Copyright © 2019 Veritas Technologies, LLC 13
Ensuring Predictable Uptime
WE WILL WORK WITH YOUTO DEMONSTRATE HOWVERITAS CAN HELPYOUR LONG-TERM CLOUD GOALS
Adopt multi-clouds while
protecting current
investments
Ensure seamless workload
mobility across sites and
clouds
Predictably meet service levels
with real visibility and
compliance reporting
Copyright © 2019 Veritas Technologies, LLC 14
INSIGHT: How itWorks
See the Data Target the Data Act on Data
Copyright © 2019 Veritas Technologies, LLC 15
VISUALIZE ON DASHBOARD
See the Data
Copyright © 2019 Veritas Technologies, LLC 16
METADATA + CLASSIFICATION
Target the Data
Age
Type
Size
Last accessed
Server
Location
Classification
Tags
Created
date
CONFIDENTIAL
BUSINESS CRITICAL
PII
STALE/ORPHANED
Copyright © 2019 Veritas Technologies, LLC 17
Veritas has built leadership here But we do so much more
Data Center
Backup
Digital ComplianceDisaster RecoveryCloud Backup Data Visibility Long term Retention
In Summary
TheVeritas Portfolio of Information ManagementCapabilities
ProtectionInsight
Availability
Data
Enterprise
VaultInformation
Studio
NetBackup
NetBackup
Appliance
Access ApplianceeDiscovery
Platform
Data Access
Software
InfoScale
StorageResiliency
Platform
Data
Insight
InfoScale
Enterprise InfoScale
Availability
TheVeritas Portfolio of Information ManagementCapabilities
File
Classification
Legal
Disposition
Unstructured
Data Visibility
Backup &
Recovery
Long Term
Retention / Tape
Replacement
Software Defined
Storage
Integrated PBBA
Archiving &
Retention
Business Resiliency
High Availability
The Leading Data ManagementCompany
© 2017 Veritas Technologies20
MARKET
LEADERSHIP
#1
LOYAL
CUSTOMERS
TRUST &
INNOVATION
LEADERSHIP QUADRANT INDUSTRY AWARDS
AND RECOGNITIONS
LAST 12 MONTHS
Top20
ENTERPRISE
SOFTWARE COMPANY
BY REVENUE
10+
‘EXECUTES WELL TODAY,
WELL POSITIONED FOR
TOMORROW’
>86% >20,000
RENEWAL RATE
AVERAGE CUSTOMER
> 8 YRS
93%
PARTNERS
>700 MANAGED
GLOBAL DISTRIBUTORS
50,000+
ENTERPRISE
CUSTOMERS
500+
PATENTS GRANTED IN
BACKUP AND RECOVERY
61 PATENTS FILED
LAST 12 MONTHS
5
KEY
NEW PRODUCT
LAUNCHES
MAJOR RELEASES
TO EXISTING PORTFOLIO
FASTEST GROWING
APPLIANCES
32 Cloud
FORTUNE 500
RELY ON VERITAS
Thank you!
Copyright © 2017 Veritas Technologies. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarksof Veritas Technologies or its affiliates in the
U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or
implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Herve Evonlah
Herve.evonlah@veritas.com

Contenu connexe

Tendances

Oc cio roundtable mooney management imperatives for realizing value from clou...
Oc cio roundtable mooney management imperatives for realizing value from clou...Oc cio roundtable mooney management imperatives for realizing value from clou...
Oc cio roundtable mooney management imperatives for realizing value from clou...
James Sutter
 

Tendances (20)

10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud
 
Big data security
Big data securityBig data security
Big data security
 
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
 
Rama Kolappan – The multi-cloud geared for the digital business
Rama Kolappan – The multi-cloud geared for the digital businessRama Kolappan – The multi-cloud geared for the digital business
Rama Kolappan – The multi-cloud geared for the digital business
 
Experience Data Management Clarity with Veritas - VMworld 2019 Presentation
Experience Data Management Clarity with Veritas - VMworld 2019 PresentationExperience Data Management Clarity with Veritas - VMworld 2019 Presentation
Experience Data Management Clarity with Veritas - VMworld 2019 Presentation
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
 
OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015
 
OpenText Secure MFT (Managed File Transfer)
OpenText Secure MFT (Managed File Transfer)OpenText Secure MFT (Managed File Transfer)
OpenText Secure MFT (Managed File Transfer)
 
A simple approach to a successful cloud implementation
A simple approach to a successful cloud implementationA simple approach to a successful cloud implementation
A simple approach to a successful cloud implementation
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
 
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the CloudCut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
 
Uptime Group
Uptime GroupUptime Group
Uptime Group
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesProtecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
 
Interested in working at Druva?
Interested in working at Druva?Interested in working at Druva?
Interested in working at Druva?
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital Economy
 
4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
 
Protecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud SecurityProtecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud Security
 
Oc cio roundtable mooney management imperatives for realizing value from clou...
Oc cio roundtable mooney management imperatives for realizing value from clou...Oc cio roundtable mooney management imperatives for realizing value from clou...
Oc cio roundtable mooney management imperatives for realizing value from clou...
 

Similaire à Conférence - Les enjeux et la vision de Veritas sur la protection des données - #ACSS2019

Hu Yoshida's Point of View: Competing In An Always On World
Hu Yoshida's Point of View: Competing In An Always On WorldHu Yoshida's Point of View: Competing In An Always On World
Hu Yoshida's Point of View: Competing In An Always On World
Hitachi Vantara
 
Slides: Beyond Metadata — Enrich Your Metadata Management with Deep-Level Dat...
Slides: Beyond Metadata — Enrich Your Metadata Management with Deep-Level Dat...Slides: Beyond Metadata — Enrich Your Metadata Management with Deep-Level Dat...
Slides: Beyond Metadata — Enrich Your Metadata Management with Deep-Level Dat...
DATAVERSITY
 

Similaire à Conférence - Les enjeux et la vision de Veritas sur la protection des données - #ACSS2019 (20)

VSD Paris 2018 - Présentation Finale
VSD Paris 2018 - Présentation FinaleVSD Paris 2018 - Présentation Finale
VSD Paris 2018 - Présentation Finale
 
AWSome Data Visibility with Information Map
AWSome Data Visibility with Information MapAWSome Data Visibility with Information Map
AWSome Data Visibility with Information Map
 
Veritas corporate brochure emea
Veritas corporate brochure emeaVeritas corporate brochure emea
Veritas corporate brochure emea
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
 
Analyst Keynote: Forrester: Data Fabric Strategy is Vital for Business Innova...
Analyst Keynote: Forrester: Data Fabric Strategy is Vital for Business Innova...Analyst Keynote: Forrester: Data Fabric Strategy is Vital for Business Innova...
Analyst Keynote: Forrester: Data Fabric Strategy is Vital for Business Innova...
 
Data Virtualization Accelerating Your Data Strategy
Data Virtualization Accelerating Your Data StrategyData Virtualization Accelerating Your Data Strategy
Data Virtualization Accelerating Your Data Strategy
 
Veritas Solution Day 2017, France, keynote by Mike Palmer
Veritas Solution Day 2017, France, keynote by Mike PalmerVeritas Solution Day 2017, France, keynote by Mike Palmer
Veritas Solution Day 2017, France, keynote by Mike Palmer
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016
 
Innovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big DataInnovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big Data
 
Hu Yoshida's Point of View: Competing In An Always On World
Hu Yoshida's Point of View: Competing In An Always On WorldHu Yoshida's Point of View: Competing In An Always On World
Hu Yoshida's Point of View: Competing In An Always On World
 
Jason Tooley – Welcome to Vision Solution Day EMEA
Jason Tooley – Welcome to Vision Solution Day EMEAJason Tooley – Welcome to Vision Solution Day EMEA
Jason Tooley – Welcome to Vision Solution Day EMEA
 
Delivering Analytics at The Speed of Transactions with Data Fabric
Delivering Analytics at The Speed of Transactions with Data FabricDelivering Analytics at The Speed of Transactions with Data Fabric
Delivering Analytics at The Speed of Transactions with Data Fabric
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Large-Scale Remote Access & Mobility
Large-Scale Remote Access & MobilityLarge-Scale Remote Access & Mobility
Large-Scale Remote Access & Mobility
 
Data is Big - Ensure it's Resilient
Data is Big - Ensure it's ResilientData is Big - Ensure it's Resilient
Data is Big - Ensure it's Resilient
 
Five reasons why manufacturing businesses should adopt cloud computing-23-05-...
Five reasons why manufacturing businesses should adopt cloud computing-23-05-...Five reasons why manufacturing businesses should adopt cloud computing-23-05-...
Five reasons why manufacturing businesses should adopt cloud computing-23-05-...
 
Accelerating Digital Transformation with Better Data Management
Accelerating Digital Transformation with Better Data ManagementAccelerating Digital Transformation with Better Data Management
Accelerating Digital Transformation with Better Data Management
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 
Slides: Beyond Metadata — Enrich Your Metadata Management with Deep-Level Dat...
Slides: Beyond Metadata — Enrich Your Metadata Management with Deep-Level Dat...Slides: Beyond Metadata — Enrich Your Metadata Management with Deep-Level Dat...
Slides: Beyond Metadata — Enrich Your Metadata Management with Deep-Level Dat...
 

Plus de African Cyber Security Summit

Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
African Cyber Security Summit
 

Plus de African Cyber Security Summit (20)

Bilan & Perspectives #ACSS2019
Bilan & Perspectives #ACSS2019Bilan & Perspectives #ACSS2019
Bilan & Perspectives #ACSS2019
 
Rapport de Visibilité #ACSS2019
Rapport de Visibilité #ACSS2019Rapport de Visibilité #ACSS2019
Rapport de Visibilité #ACSS2019
 
Atelier Technique - F5 - #ACSS2019
Atelier Technique - F5 - #ACSS2019Atelier Technique - F5 - #ACSS2019
Atelier Technique - F5 - #ACSS2019
 
Atelier Technique - F5 - #ACSS2019
Atelier Technique - F5  - #ACSS2019Atelier Technique - F5  - #ACSS2019
Atelier Technique - F5 - #ACSS2019
 
Atelier Technique - Symantec - #ACSS2019
Atelier Technique - Symantec - #ACSS2019Atelier Technique - Symantec - #ACSS2019
Atelier Technique - Symantec - #ACSS2019
 
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
 
Conférence - Loi 18-07 du 10 Juin 2018 : la protection des données à caractèr...
Conférence - Loi 18-07 du 10 Juin 2018 : la protection des données à caractèr...Conférence - Loi 18-07 du 10 Juin 2018 : la protection des données à caractèr...
Conférence - Loi 18-07 du 10 Juin 2018 : la protection des données à caractèr...
 
Conférence - Le métier du RSSI en pleine évolution - #ACSS2019
Conférence - Le métier du RSSI en pleine évolution -  #ACSS2019Conférence - Le métier du RSSI en pleine évolution -  #ACSS2019
Conférence - Le métier du RSSI en pleine évolution - #ACSS2019
 
Conférence - Vecteurs d'attaques basées sur les navigateurs et comment se pro...
Conférence - Vecteurs d'attaques basées sur les navigateurs et comment se pro...Conférence - Vecteurs d'attaques basées sur les navigateurs et comment se pro...
Conférence - Vecteurs d'attaques basées sur les navigateurs et comment se pro...
 
Conférence - Pourquoi le PAM (Privileged Access Management) doit-il être le s...
Conférence - Pourquoi le PAM (Privileged Access Management) doit-il être le s...Conférence - Pourquoi le PAM (Privileged Access Management) doit-il être le s...
Conférence - Pourquoi le PAM (Privileged Access Management) doit-il être le s...
 
Conférence - Adopter une approche de sécurité applicative avancée - #ACSS 2019
Conférence - Adopter une approche de sécurité applicative avancée - #ACSS 2019Conférence - Adopter une approche de sécurité applicative avancée - #ACSS 2019
Conférence - Adopter une approche de sécurité applicative avancée - #ACSS 2019
 
Conférence - Digital Identity and Blockchain - #ACSS2019
Conférence - Digital Identity and Blockchain - #ACSS2019Conférence - Digital Identity and Blockchain - #ACSS2019
Conférence - Digital Identity and Blockchain - #ACSS2019
 
Bilan & Perspectives - ACSS 2018
Bilan & Perspectives -  ACSS 2018Bilan & Perspectives -  ACSS 2018
Bilan & Perspectives - ACSS 2018
 
Rapport de Visibilité ACCS 2018
Rapport de Visibilité ACCS 2018Rapport de Visibilité ACCS 2018
Rapport de Visibilité ACCS 2018
 
Atelier Technique CISCO ACSS 2018
Atelier Technique CISCO ACSS 2018Atelier Technique CISCO ACSS 2018
Atelier Technique CISCO ACSS 2018
 
Atelier Technique SYMANTEC ACSS 2018
Atelier Technique SYMANTEC ACSS 2018Atelier Technique SYMANTEC ACSS 2018
Atelier Technique SYMANTEC ACSS 2018
 
Atelier Technique MANAGE ENGINE ACSS 2018
Atelier Technique MANAGE ENGINE ACSS 2018Atelier Technique MANAGE ENGINE ACSS 2018
Atelier Technique MANAGE ENGINE ACSS 2018
 
Atelier Technique EXTREME NETWORKS ACSS 2018
Atelier Technique EXTREME NETWORKS ACSS 2018Atelier Technique EXTREME NETWORKS ACSS 2018
Atelier Technique EXTREME NETWORKS ACSS 2018
 
Atelier Technique WALLIX ACSS 2018
Atelier Technique WALLIX ACSS 2018Atelier Technique WALLIX ACSS 2018
Atelier Technique WALLIX ACSS 2018
 
Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Dernier (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Conférence - Les enjeux et la vision de Veritas sur la protection des données - #ACSS2019

  • 1. The truth in information. Les enjeux et LaVision deVeritas sur la protection des données Herve Evonlah Country Manager, French Speaking Africa Cell: +27763460669
  • 2. The Digital Business Relies on Information Always Available, Compliant, Relevant Electronic Supply Chains Customer Service Personally Identifiable Legal / Regulatory Big Data/ Analytics Mobile Workforce Digital Workflows IoT Data
  • 3. We Assume All Data isValuable. Forever. © 2017 Veritas Technologies3 Data is the new oil.” Shivon Zilis Partner, Bloomberg Beta 39% Data Growth average growth per year StorageVelocity 9% faster than we are creating individual files 2007 2008 2009 2010 2011 2012 2013 2014 2017 2018 2019
  • 4. But,Why Don’tWeTreat itThatWay? © 2017 Veritas Technologies4 33% 52%Dark Data ROT 15%Clean We don’t have a clue what most of it is. The Global Databerg Report, 2016 Much of it goes untouched and unleveraged. Data Genomics Index, 2016 41% less than 3 years old at least 3 years old 2015 2014 2013 2012 2011 2010 2009 2008 2007 more than 7 years old But, we know a good chunk should be deleted. The Data Hoarding Report, 2016 On average, ITDMs keep 54%of the files they create 42% 28% 16% Unencrypted company secrets Embarrassing or incriminating employee correspondence Sexually explicit material ITDMs admit storing unfavorable items on personal or company devices
  • 5. ButThere Are Significant ChallengesToday Poor Visibility • Data is scattered, mostly unstructured, across heterogeneous systems • No single source of truth to make informed decisions Exposed to Risk • Low visibility into what is being stored or accessed by users, backed up, retained • Business risk from non-compliance, unplanned downtime, service interruption $ Paying Too Much • Storing everything, including old, redundant or irrelevant data • Maintaining accumulated legacy infrastructure Not Agile Enough • Not developing new applications quickly enough • Limited by traditional IT processes L
  • 6. Copyright © 2019 Veritas Technologies, LLC 6 THE PROBLEM Organizations need a quick and simple way to get value out of data, while mitigating risk.
  • 7. IT is Under Pressure from Multiple Directions Hybrid Clouds Need ability to reliably migrate/failover workloads seamlessly across Clouds as needed Open Source Open Stack and Containers being adopted by developers, but need enterprise class ‘-ilities’ Big Data Need to provide visibility into large sets of unstructured data for business decision making, monetization Always On Need to protect and preserve data at all times, ensure it is available & recoverable with no interruption to operations Increased Regulation Need to know where your data is, and apply compliance policies consistently Need to reliably store, protect and provision enterprise data at scale on choice of hardware Security IT
  • 8. Copyright © 2019 Veritas Technologies, LLC.8 DELETION Files or emails get deleted or corrupted. AUDITING Government Industry Medical Insurance GDPR DATABASES Rollback recovery Corruption Cloning (QA/Dev) Testing Malicious code HARDWARE FAILURE Less likely with modern hardware but still an issue. Clustering is not backup. DISASTER A disaster may not be a “big smoking hole” Ransomware Malicious attacks Employee sabotage Customer Business Challenge – Data Loss Top Five Reasons to Back Up Only a handful of customers will lose data from a natural disaster Copyright © 2019 Veritas Technologies, LLC 9 THE SOLUTION A unified Data Management offering clear insight, targeted protection and orchestrated availability.
  • 9. Copyright © 2019 Veritas Technologies, LLC 9 The Veritas Holistic Approach of Data Management Capabilities LEADER IN ENTERPRISE DATA SERVICES • ProtectALLYour Data at Scale • Recover, Provision and Disaster Recovery • Intelligent tiering and retirement • Ransomware Resiliency • Scale-out and hyper-convergence PROTECTION AVAILABILITY • 24x7 for mission critical workloads • HA & DR across on-prem, virtual and cloud • QoS and SLAs based on apps INSIGHTS • Visualization & Classification • Reporting & Analytics • Compliance & Governance
  • 10. Copyright © 2019 Veritas Technologies, LLC 10 Protection: How itWorks
  • 11. Copyright © 2019 Veritas Technologies, LLC 11 Unified Protection Protect Data At Scale for the best data protection solution for any environment. Hyperconverged Open Source Big Data Platforms Virtual Acropolis Legacy Cloud Physical
  • 12. Availability: How itWorks 0011101010010000111100101011010101010011101010010000111100101011010 0011101010011010100100000011101010110001110111010001111011011110110 Virtual Appliance: Resiliency Mgr Infrastructure Mgr NetBackup Custom InfoScale Enterprise Virtual Appliance: Resiliency Mgr Infrastructure Mgr Traditional Private Cloud 0011101010010000111100101011010101010011101010010000111100101011010 0011101010011010100100000011101010110001110111010001111011011110110 VM VM VM VMVM VM VM VM VM VMVM VM VM VM VM VMVM VM VM VM VM VMVM VM Virtual Replication Appliance Virtual Replication Appliance Copyright © 2019 Veritas Technologies, LLC
  • 13. Copyright © 2019 Veritas Technologies, LLC 13 Ensuring Predictable Uptime WE WILL WORK WITH YOUTO DEMONSTRATE HOWVERITAS CAN HELPYOUR LONG-TERM CLOUD GOALS Adopt multi-clouds while protecting current investments Ensure seamless workload mobility across sites and clouds Predictably meet service levels with real visibility and compliance reporting
  • 14. Copyright © 2019 Veritas Technologies, LLC 14 INSIGHT: How itWorks See the Data Target the Data Act on Data
  • 15. Copyright © 2019 Veritas Technologies, LLC 15 VISUALIZE ON DASHBOARD See the Data
  • 16. Copyright © 2019 Veritas Technologies, LLC 16 METADATA + CLASSIFICATION Target the Data Age Type Size Last accessed Server Location Classification Tags Created date CONFIDENTIAL BUSINESS CRITICAL PII STALE/ORPHANED
  • 17. Copyright © 2019 Veritas Technologies, LLC 17 Veritas has built leadership here But we do so much more Data Center Backup Digital ComplianceDisaster RecoveryCloud Backup Data Visibility Long term Retention In Summary
  • 18. TheVeritas Portfolio of Information ManagementCapabilities ProtectionInsight Availability Data
  • 19. Enterprise VaultInformation Studio NetBackup NetBackup Appliance Access ApplianceeDiscovery Platform Data Access Software InfoScale StorageResiliency Platform Data Insight InfoScale Enterprise InfoScale Availability TheVeritas Portfolio of Information ManagementCapabilities File Classification Legal Disposition Unstructured Data Visibility Backup & Recovery Long Term Retention / Tape Replacement Software Defined Storage Integrated PBBA Archiving & Retention Business Resiliency High Availability
  • 20. The Leading Data ManagementCompany © 2017 Veritas Technologies20 MARKET LEADERSHIP #1 LOYAL CUSTOMERS TRUST & INNOVATION LEADERSHIP QUADRANT INDUSTRY AWARDS AND RECOGNITIONS LAST 12 MONTHS Top20 ENTERPRISE SOFTWARE COMPANY BY REVENUE 10+ ‘EXECUTES WELL TODAY, WELL POSITIONED FOR TOMORROW’ >86% >20,000 RENEWAL RATE AVERAGE CUSTOMER > 8 YRS 93% PARTNERS >700 MANAGED GLOBAL DISTRIBUTORS 50,000+ ENTERPRISE CUSTOMERS 500+ PATENTS GRANTED IN BACKUP AND RECOVERY 61 PATENTS FILED LAST 12 MONTHS 5 KEY NEW PRODUCT LAUNCHES MAJOR RELEASES TO EXISTING PORTFOLIO FASTEST GROWING APPLIANCES 32 Cloud FORTUNE 500 RELY ON VERITAS
  • 21. Thank you! Copyright © 2017 Veritas Technologies. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarksof Veritas Technologies or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Herve Evonlah Herve.evonlah@veritas.com

Notes de l'éditeur

  1. Almost every business is going through some form of digital transformation, and is reliant on information in order to function. Whether you’re transforming the way you’re addressing your customers or your partners, mobilizing your workforce, having to manage private or regulated information, or just using data to make better operational decisions – timely access to relevant information is critical to success. So you could argue that your data is one the most critical assets you possess.  You can outsource your IT infrastructure, your real estate, even your workforce – but your data is the one thing you always need to own and manage yourself. It must be available anywhere/anytime, properly protected, compliant with regulations, and seen as a business enabler rather than deadweight. [EBC ice-breaker questions: “Where are you on this spectrum?”, “Do you use cloud services, digital processes, mobile apps?”, “Do you know where all your data is, whether it’s protected or compliant with regulations?”] And yet in our experience from talking to customers, most companies are not managing their information like a critical business asset. Far from using it for competitive advantage, it’s actually a business liability…
  2. DattPresenter: This situation is unsustainable. We are creating and relying on more and more data at accelerated rates. The 2016 data genomics world wide report pegged the real data growth rate at 39%. Some have expressed that data is the new oil. It’ll make us rich…and we need to harness it’s power. But not all data is created equal. The trouble is we hold on to everything forever. Saving data forever actually impedes our ability to capitalize on what’s truly valuable.
  3. Presenter: So, why don’t we treat data like it truly is the “new oil”. Oil is refined into usable components. Data is just hoarded. Forever. According to the Data Genomics Index 2016, 41% of the typical enterprise hoard of unstructured data has not been modified in 3 years. According to the Databerg Report 2016, 33% of the data stored is ROT and 52% is Dark – meaning, we have no clue what it is. According to the Data Hoarding Report 2016, we’re storing things like unencrypted company secrets, embarrassing correspondence, and sexually explicit material. ROT – redundant, outdated & trivial
  4. Penalties for not Focusing on Information Enough (can select from the bullets for talk track) COST LOSS OF VISIBILITY & CONTROL EXPOSURE TO LEGAL/COMPLIANCE RISK, DATA BREACHES ETC LOSS OF COMPETITIVE ADVANTAGE – EVEN LOSS OF THE BUSINESS! So Information needs to be managed like the critical business asset that it is….
  5. The problem is that organizations need a quick and simple way to get value out of data while mitigating risk. However, organizations have been keeping everything forever because they know the information has value. So much value that it is too risky to let go of that information without the confidence to do so. In an information centric world, the data that organizations create and store is their greatest asset. We also depend on information in our daily jobs, but often times important business critical or valuable data is buried. In a world that values information, organizations are now challenged to make decisions about what to do with this information. Decisions around how to get value out of data while mitigating risk in an increasingly complex and regulated environment is getting extremely difficult.
  6. I’m sure many of these trends are familiar. [EBC question: “Which of these are you seeing in your business?”] Hybrid Clouds: They’re being adopted because customers don't want to pre-buy capacity and want access to more on-demand infrastructure. But from a data pov, they still need to make sure that data is protected, available and transportable as needed through different service providers + on premise infrastructure Big Data: The ultimate payoff from managing your data more closely is the ability to run the business more efficiently, plan more accurately, even monetize the value in that data. But that requires a lot of preparation prior to the Big Data analysis, on-demand availability and access to lots of high performance storage Regulation: Regulatory frameworks are becoming more demanding – particularly in Europe with GDPR although there are regional equivalents everywhere. You need to know what data can leave your country, what permissions are needed to touch data, how to ensure privacy and appropriate retention, whether cloud infrastructures are allowed, and so on Always On: The standard expectation is that these infrastructures are always on and available, in the same way that mainframes were decades ago. And yet they also need flexibility, agility and protection across a heterogeneous landscape including apps and data, which makes that more challenging White Box Storage: We’re seeing a rise in adoption of commodity storage - hardware with the cheapest possible component parts but no value add on top. No longer plug and play - it needs a lot of software on top to make it usable in an enterprise setting – software that we provide. And it’s likely that you still have legacy storage systems from EMC, NetApp etc, so the software needs to accommodate that while giving you complete freedom to use whatever storage makes sense for the task Open Source: In parallel with adoption of commodity hardware, there’s another movement away from traditional proprietary environments with Open Source software, particularly OpenStack and Containers. Attractive to developers and low cost to adopt, but it comes with extra challenges around security, scalability, storage performance and availability. 
  7. Ensuring Predictable Uptime Across The Multi-Cloud Is Hard. Veritas Makes It Easy. Predictably meet service levels with real visibility and compliance reporting Ensure seamless workload mobility across sites and clouds Adopt multi-clouds while protecting current investments
  8. Veritas information studio goes beyond data visualization to provide classification, targeting and action on the data that matters most. See the data Comprehensive insight into data, regardless of where it’s stored Automated data classification Context into dark data Target the data Robust file analysis aggregates file metadata Intuitive user interface allows any user to easily dive into data Act on data Informed, confident action can be taken to address compliance needs Use metadata and classification tags to quickly find and resolve unseen risk
  9. Once data sources have been connected, the Information Studio dashboard provides a geographic orientation of all data allowing any user to dive into a specific location, file server, share, user, classification tag, or any combination of the available filters. It also gives an overview of the total orphaned, stale and non-business data. It also provides the amount of money being spent to store the various types of data. Orphaned means the owner of the data is no longer with the company, stale means the data hasn’t been touched/modified in a certain period of time and non-business data is anything previously set as non-business (.mp4 files as an example)
  10. Organize your data By aggregating metadata to build an information profile you can now render an organized view of your unstructured data. You can determine where PII, confidential, business critical and stale/orphaned data lives. This is not an exhaustive list, but rather an example.
  11. Veritas is a 360° provider for data management. This is a view of those capabilities mapped to our product portfolio. Starting in the Protection part of the wheel in the blue, we provide all the necessary infrastructure in all the technology environments to make sure that your data is Protected and Accessible: backing it up, providing it in various form factors, being able to do copy data management, and ensuring high availability to premise or to cloud. NetBackup, the leading B&R solution in the industry, is the foundation for many of the other products and technologies listed here. Velocity is our new data virtualization/CDM solution At the same time, we’re able to orchestrate heterogeneous workloads in the green section (Availabiity). That includes technologies such as Software Defined Storage (SDS) whether in conventional environments, across clouds, or in OpenStack environments. This provides not only high data availability for all classes of app, but the ability to move workloads around between those environments reliably and quickly, as needed for best optimization. Main product family here is InfoScale and more recently HyperScale for OpenStack. At the top left of this wheel we’re talking about Information Insight, where we enable new visibility into the data estate and want to become a System of Record that allows that data to be analyzed and to be safely policy controlled. And underneath you can see another important concept – the Information Fabric. This is the ‘glue’ that ties everything together and allows the various technologies and products in the wheel to share services ‘under the covers’. You’ll be hearing more about this as we build out our Information Management Platform over the next few years.
  12. Here is a view of the products that make up each of these categories.
  13. Veritas is the #1 or #2 leader in all major market segments that it serves, a position endorsed by leading analysts and Fortune 500 customers. We also have a significant amount of intellectual property from having been innovators in Information Management for nearly 30 years. We are trusted by some of the largest and most demanding customers in the world as well as many thousands of smaller businesses in every major region, and enjoy continued growth in both our core businesses as well as newer initiatives.