Tag Archives: Enterprise Data Management

The 2019 Dell EMC Unity XT + PowerProtect Primer!

The 2019 Dell EMC Unity XT + PowerProtect Primer!

One of big stories out of Dell Technologies World 2019 was about new Dell storage and data management solutions, like Unity XT and PowerProtect.

Here is our primer on the new Dell EMC Unity XT unified storage solutions, the Dell EMC PowerProtect data management platform, as well as updates on Isilon and more!

 

The 2019 Dell Storage + Data Management Solutions Revealed!

In the following 30-minute long video, we have top guns from Dell EMC to showcase the 2019 Dell storage and data management solutions :

  • Jeff Clarke (Vice Chairman, Dell Technologies),
  • John Roese (Dell Technologies President & Dell EMC Chief Technology Officer),
  • Craig Bernero (Senior Vice President, Dell EMC Midrange & Entry Storage),
  • Beth Phalen (President & General Manager of Dell EMC Data Protection), and
  • Chad Dunn (Vice President of Product Management, Dell EMC Hyperconverged Infrastructure)

 

The 2019 Dell EMC Unity XT

The next-generation Dell EMC Unity XT midrange storage system is up to 2X faster than its predecessor, and 67% faster than its nearest competitor.

Optimised for greater data efficiency with up to 5:1 data reduction and 85% system efficiency, the Unity XT is built for a multi-cloud world.

The new Unity XT can run in a public cloud, seamlessly move data to the cloud, and is available as a service through the new Dell EMC Cloud Storage Services. It can also be used as a building block for Dell Technologies Cloud, as part of a validated design.

Unity XT storage arrays use an active-active architecture, and is NVMe-ready. They are designed to simultaneously run applications, process file and block inline data reduction, while delivering operational data services.

 

Dell EMC Isilon Update

Dell EMC also announced a new Isilon release with greatly improved scalability, as well as enhanced cloud integration and security.

The new Isilon OneFS 8.2 provides up to 75% greater cluster scalabilityup to 252 nodes, 58 PB of storage, and 945 GB/s of aggregate throughput per cluster!

 

Dell EMC Cloud Storage Services

To support enterprises looking to extend their on-premise infrastructure to public cloud, Dell Technologies is introducing the Dell EMC Cloud Storage Services.

The new Cloud Storage Services uses Dell EMC storage directly connected to the public cloud through a managed service provider, to give customers multi-cloud agility.

Furthermore, VMware customers can also leverage the automated disaster-recovery-as-a-service (DRaaS) in VMware Cloud on AWS.

 

Dell EMC PowerProtect

Dell EMC also introduced their PowerProtect Software platform, and the Dell EMC PowerProtect X400 multi-dimensional appliance.

The Dell EMC PowerProtect Software platform delivers data protection, replication and reuse, as well as SaaS-based management and self-service capabilities. The data owner now has the autonomy to control backup and recovery operations.

VMware customers will benefit from a simple data management solution for their vSphere environments, with automated policy-based backup and recovery, as well as integration with vRealize Automation.

Available as a hybrid, or all-flash data management appliance, the Dell EMC PowerProtect X400 can scale-up with grow-in-place capacity expansion, and scale-out compute power and capacity.

It is also the first Dell EMC data management solution to leverage machine learning for intelligent load balancing.

 

Dell EMC Integrated Data Protection Appliance

For small- and medium-sized businesses looking for improved data protection in an integrated appliance, Dell EMC is offering the Dell EMC DP4400 Integrated Data Protection Appliance with 8 to 24 TB of storage.

The lower storage capacity version of IDPA DP4400 makes it ideal for smaller organisations. yet, it has the ability to grow-in-place up to 96 TB, with the purchase of licence keys and an upgrade kit.

 

Recommended Reading

Go Back To > Business + Enterprise | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


The Dell EMC PowerEdge 2019 Server Updates Revealed!

Dell has just announced details of the Dell EMC PowerEdge 2019 server updates. Here is a quick primer on the newly-refreshed Dell EMC PowerEdge servers and OpenManage systems management.

 

The Dell EMC PowerEdge 2019 Server Updates

The Dell EMC PowerEdge 2019 servers will come with new features like Openmanage FlexSelect Manage, and OpenManage FlexSelect Secure.

Both these features will provide greater flexibility in managing and securing the PowerEdge 2019 servers.

Greater Control

FlexSelect Manage offers customers new flexibility in selecting OpenManage Enterprise capabilities to streamline management efficiency.

Enhancements to the Redfish-compliant Dell EMC RESTful API and OpenManage Mobile also gives customers greater control of their server operations and devices.

Customers can reduce time by using fewer steps to maintain server health by 28%, compared to manually retrieving server logs.

Enhanced Security

OpenManage Secure Enterprise Key Manager Scale provides data protection and streamlines the management of self-encrypting drives.

Customers can centrally manage keys for self-encrypting drives to better secure data at both the drive and server level.

Improved Performance and Scalability

The Dell EMC PowerEdge 2019 servers are powered by the 2nd Generation Intel Xeon Scalable processors, increasing their performance by up to 40% for core business applications.

 

Dell EMC PowerEdge 2019 Server Availability

These new Dell EMC PowerEdge 2019 servers and systems will be available beginning Q2 2019 :

  • Dell EMC OpenManage
  • Dell EMC PowerEdge R940, R740, R740xd, R740xd2, R640, and C6420 servers (with 2nd Generation Intel Xeon Scalable processors)
  • Other Dell EMC PowerEdge servers like PowerEdge MX
  • Dell EMC Ready Solutions for HPC with Intel Deep Learning Boost

Also available in Q2 2019 is the Intel Optane DC persistent memory hands-on trials through a Dell EMC customer proof of concept program and Dell Technologies Customer Solution Centers.

 

Recommended Reading

Go Back To > Enterprise + Business | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


TUV Rheinland : Cyber Risk Management for Industry 4.0

On 19 March 2018, TUV Rheinland invited us to an exclusive Industry 4.0 cybersecurity seminar. Entitled Cyber Risk Management for Industry 4.0, it looks at the role of cybersecurity in securing critical infrastructure and heavy industries, and paving the way for Industry 4.0.

Join us for the presentations by TUV Rheinland cybersecurity experts on how you can secure your company against the latest cyberthreats.

 

Industry 4.0

Industry 4.0 refers to the new industrial trend of creating “smart factories” with highly-networked manufacturing technologies.

Also referred to as the 4th Industrial Revolution, it makes use of cyber-physical systems, Internet of Things, cloud computing and cognitive computing, to automate almost every aspect of the manufacturing process.

Fun Fact : The name Industry 4.0 comes from the German “Industrie 4.0” from the high-tech strategy of the German government to promote the computerisation of manufacturing.

 

TUV Rheinland : Cyber Risk Management for Industry 4.0

The Cyber Risk Management for Industry 4.0 seminar is a platform for TUV Rheinland to share their insights on developing cybersecurity measures to manage operational cyber risk, be it for smart factories, smart devices or smart vehicles.

According to TUV Rheinland, the discipline of Cyber Risk Management can be effectively implemented if cybersecurity and privacy are addressed by design – both in strategy as well as operations. Let’s hear from their experts…

Operational Technology Protected

by Nigel Stanley, Chief Technology Officer of TUV Rheinland Industrial

Automotive Cyber Security

by Rajeev Sukumaran, Director of TUV Rheinland Consulting Services

Critical Infrastructure Protection – Railways & Utilities

by Tarun Gupta, Principal Consultant of TUV Rheinland Industrial Security

Privacy & Security In The IOT World

by Urmez Daver, Vice President of TUV Rheinland Consulting Services

Go Back To > Events | Home

[adrotate group=”1″]

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Palo Alto Networks : Not Enough Cybersecurity Staff In Healthcare

Palo Alto Networks revealed that despite an increase in cybersecurity budgets, there is a lack of dedicated cybersecurity staff in the healthcare industry.

 

Palo Alto Networks : Not Enough Cybersecurity Staff In Healthcare

SINGAPORE, 29 November 2017 – As the adoption of digital technology in the healthcare industry accelerates, there is an increasing need to protect another side of patients’ and healthcare organisations’ well-being – the security of their personal data. This emphasis on protecting data and mitigating cyberthreats is reflected in the industry’s significant investment into cybersecurity.

According to a recent survey * by Palo Alto Networks, about 70 percent of healthcare organisations in Asia-Pacific say that 5 to 15 percent of their organisation’s IT budget is allocated to cybersecurity.

The survey was conducted amongst more than 500 business professionals in APAC, covering Australia, China, Hong Kong, India and Singapore markets.

However, despite substantial budgets, there seems to be a need for the healthcare industry to catch-up with industry peers in terms of cybersecurity talent, with only 78 percent having a team in their organisations dedicated to IT security, the lowest among other industries surveyed. This is also well-below the industry-wide average of 86 percent.

 

Risk factors

Aside from monetary loss associated with data breaches and availability of connected devices which monitor patient lives, healthcare professionals are most worried about the loss of clients’ contacts, financial or medical information – 30 percent have cited loss of details as key. Fear of damaging the company’s reputation among clients comes next at 22 percent, followed by 17 percent citing company downtime while a breach is being fixed as a concern.

Cybersecurity risks in healthcare organisations are also amplified with BYOD (Bring Your Own Device), with 78 percent of organisations allowing employees to access work-related information with their own personal devices such as their mobile phones and computers. In addition to this, 69 percent of those surveyed say they are allowed to store and transfer their organisation’s confidential information through their personal devices.

While 83 percent claimed there are security policies in place, only 39 percent admit to reviewing these policies more than once a year – lower than the 51 percent of respondents from the finance industry, a sector also known to hold sensitive client data.

[adrotate group=”1″]

 

Call to get in shape for the future

As more healthcare organisations fall prey to cyberattacks, such as ransomware, a lapse in data security is a real threat to the industry, hence organisation-wide education and awareness are crucial towards ensuring that the right preventive measures are implemented and enforced.

54 percent of the respondents have cited an inability to keep up with the evolving solutions being a barrier to ensuring cybersecurity in their organisations, and 63 percent of respondents attributed this to an ageing internet infrastructure as the likely main reason for cyberthreats, should they happen.

 

Palo Alto Networks Tips For Healthcare Organisations

Here are some tips for healthcare organisations:

  • Ensure that medical devices are equipped with up-to-date firmware and security patches to address cybersecurity risks. Medical devices are notoriously vulnerable to cyberattacks because security is often an afterthought when the devices are designed and maintained by the manufacturer. These precautionary measures may include having an inventory on all medical devices, accessing network architecture and determining patch management plan for medical devices, as well as developing a plan to migrate medical devices to the medical device segment.
  • Apply a zero trust networking architecture for hospital networks, making security ubiquitous throughout, not just at the perimeter. Healthcare organisations should look to segment devices and data based on their risk, inspecting network data as it flows between segments, and requiring authentication to the network and to any application for any user on the network.
  • Practices such as BYOD and some employees’ ability to store and transfer confidential information through their personal devices put them at a higher risk of phishing attacks. To prevent this, healthcare providers should ensure that staff undergo regular end-user security training to reduce successful phishing. Cybersecurity best practices can be taught as a new hire class for every employee.
  • As healthcare organisations migrate portions of their critical infrastructure and applications to the cloud, it becomes imperative for an advanced and integrated security architecture to be deployed to prevent cyberattacks on three-prongs: the network, the endpoint and the cloud. Traditional antivirus will not be effective in guarding against advanced malware such as ransomware which continuously changes to avoid detection.

Go Back To > News | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

The Veritas 360 Enterprise Data Management Tech Briefing

Yesterday, we were invited to an exclusive tech briefing on the Veritas 360 Enterprise Data Management (EDM) system. Veritas, as you may know, is famous for its enterprise backup software – NetBackup. But as enterprises migrate their data to the cloud, they are transforming themselves beyond backup. They are now delivering enterprise data management (EDM) solutions.

 

The Veritas 360 Enterprise Data Management Approach

Raymond Goh, Head of Asia Pacific and Japan Solution Architects Group, Veritas Storage, flew in from Singapore to give the briefing on the Veritas 360 Enterprise Data Management approach. Check it out!

Here are some key takeaway points :

[adrotate banner=”4″]
  • Data is growing exponentially, and organizations struggle to have visibility to it and keep costs and risks under control with hardware alone.
  • Information is everything and data is an organization’s digital currency– it is a critical business asset that is exponentially growing in value. Veritas’ approach is to completely abstract the value of that information.
  • Veritas is exclusively dedicated to 360 enterprise data management.
  • Veritas delivers the core of any sound data management strategy with backup and recovery, archiving, disaster recovery (DR), high availability, and business resiliency
  • The Veritas 360 Data Management Approach is summarised as such :
    • The ability to transform your data into a strategic business asset starts with providing three core capabilities – Insight, Availability and Protection – need to be applied across the entire IT landscape in a scalable, consistent and manageable manner, rather than in silos.
    • Adopting a software-based approach, with the ability to span across many different environments, to apply polices centrally and integrate these capabilities (no longer enough to provide these independently) to further reduce complexity and achieve synergies.
    • A 360 approach to enterprise data management brings a fourth element to the equation: convergence between Insight, Availability and Protection into combined solutions that offer greater business value.
    • Veritas provides enterprise data management to global customers with an award-winning portfolio of insight, availability and protection solutions.

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!