SlideShare a Scribd company logo
Unlock real value from back up data
with IBM Spectrum Protect Plus
Marco van Gils
March 21, 2019
Client Technical Specialist IBM Storage
Marco_van_gils@nl.ibm.com
#NLVMUG | MARCH 21, 2019
Today’s Key Data Protection Trends
Application / Data Recovery
Data availability
Application / Data Reuse
Utilize data for new routes to market
Disaster Recovery
Recovering from a minor to major data loss
Business Continuity
Reducing the risk to the business,
employees, market perception
Cyber Resiliency
Recover the business from
a compromised attack
01
02
03
05
04
#NLVMUG | MARCH 21, 2019
Why Modernize Backup?
Lower Costs
Improved Performance
Simple / SLA Management
Enhanced
Business Agility
Multi Cloud Enablement
#NLVMUG | MARCH 21, 2019
The Phases and Processes of Data Access
Data Management / Operational Recovery
Modernize and expanded use cases with instant
data access, instant recovery leveraging snapshots
Backup
Traditional backup / recovery using
streaming backups
Archive
Long-term data retention /
compliance, corporate governance
#NLVMUG | MARCH 21, 2019
Spectrum Protect Plus – 10.1.3
• Supports
̶ VMware & Hyper-V
̶ MS SQL, Oracle, DB2, MongoDB, MS Exchange
Server (all on physical / virtual systems)
• Primary data reuse use cases
̶ Data Protection / Recovery
̶ Test/Dev, DevOps, Reporting, Analytics, etc…
The enterprise-proven data protection, data reuse solution
from IBM for multiple use cases
Backup Data Made Useful
#NLVMUG | MARCH 21, 2019
What's New in 10.1.3?
• Application Support
- MongoDB – 3.6 / 4.0 – Community and Enterprise
- Microsoft Exchange Server – 2013 CU2, 2016, 2019 – Includes item-level restores
• Optimized offload to Spectrum Protect – no need for SP4VE any longer
• Off-load to Object Storage – IBM COS, IBM COS Worm, Amazon S3, Microsoft
Azure
• High Availability of the Spectrum Protect Plus server for both VMware and
Hyper-V implementations
• Enhanced RESTful APIs – faster time to value around reporting / analytics
NEW
#NLVMUG | MARCH 21, 2019
Spectrum Protect Plus & IBM COS – Cyber Resiliency
• Spectrum Protect 10.1.3 can offload data
to IBM COS and COS WORM storage via S3
̶ Set through single SLA policy
• Data protection to IBM COS WORM is
key to any cyber resiliency strategy
̶ Offload to immutable storage
̶ “Air-gap” like capabilities
̶ Data cannot be deleted or changed
• Utilize offload to IBM COS for off-prem DR
̶ Get data off-site in the event of a disaster
̶ Recover data in multiple locations
#NLVMUG | MARCH 21, 2019
Spectrum Protect Plus – Modern Data Protection
Easy to Deploy
and Manage
Immediate ROI
Intuitive User Interface
Lower OpEx
Software Defined
Software-defined
Proactive Backup Catalog
Automated Data Protection
Instant Recovery
Data Access
Lowest RTO
Self-service – RBAC
Flexible Management
Automation
Orchestration
DevOps, Dev-Test
RESTful APIs
Application Integration
#NLVMUG | MARCH 21, 2019
New Protection / Reuse Attributes
Leading to Real Business Value
Instant Data
Recovery
Data snapshots stored
in native format
Instant recovery from
multiple recovery
points
Agentless &
Efficient
VM APIs for agentless
deployment
Incremental forever,
compression and
dedupe built in
Simple, Easy,
Modern UI
Recovery-driven
simple management
*Easy to use, new UX
SLA, SLO Based
Data
Catalog
Scalable
MongoDB
Google-like
Search interface
Find data quickly
13
#NLVMUG | MARCH 21, 2019
Cloud-like
Agility
Deliver data / systems
on demand or via
schedule
Application, database
& VM centric templates
New Protection / Reuse Attributes
Leading to Real Business Value
End-user
Self Service
Secure Roles Based
Access Controls
(RBAC)
Right data, right
people, right time, right
location
Secure Data,
No Interference
Recover in a fenced
environment
Rename databases and
mountpoints
*New vSnap encryption
Network remapping
Data Delivered
as Code
Infrastructure /
Database as a
service
RESTful APIs
Integration with
DevOps tools
16
#NLVMUG | MARCH 21, 2019
Rapid Data &
System Recovery
Native-format data for
instant access
Application-aware
recovery
New Protection / Reuse Attributes
Leading to Real Business Value
Service
Modernization
Data-as-a-Service
Task automation
Extend to the Cloud
Regulatory
Compliance
Integration with
Spectrum Protect
ensures corporate
governance /
compliance
Data
Reuse
Speed application
delivery cycles
Feed reporting and
analytics engines
19
#NLVMUG | MARCH 21, 2019
One Workflow, Multiple Use Cases
Hypervisor
Run on-premises or in IBM Cloud
Policies, Catalog
Spectrum
Protect Plus
Server
Backup Admin
Gold SLA Silver SLA Bronze SLA
Policy-Based
Management
VM Admin
Developer Help Desk
Roles-Based
AccessHypervisor
Physical Servers
(Protects applications running on
physical and virtual servers, including
Oracle/SQL/Db2/MongoDB/Exchange)
Copy Repository
vSnap Server
Local Data Center
Instant Recovery and Multi-Purpose Data Reuse
API Calls
Copy Repository
vSnap Server
Physical Servers
Remote Data Center
Hypervisor
S3
Offload to
21
#NLVMUG | MARCH 21, 2019
RE-invent Your Business
• Modernize your data protection environment
- Lower your data protection costs
- Improve your business SLAs
- Elevate your staff
- Exploit your data
- Enable the cloud
#NLVMUG | MARCH 21, 2019
© Copyright IBM Corporation 2019. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind,
express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products
and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or
service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your
enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others.
No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems,
products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products
or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.
THANK YOU

More Related Content

PDF
Delivering Modern Data Protection for VMware Environments
PDF
Data Protection Modernization - Restore, Reuse, Reinvent
PDF
A Winning Combination: IBM Storage and VMware
PDF
IBM Storage at FIS InFocus 2019
PDF
IBM Power Systems at FIS InFocus 2019
PDF
S104877 cdm-data-reuse-jburg-v1809d
PDF
IBM in Surveillance: Solutions that Deliver Innovation
PDF
S104875 nightmares-dreams-spectrum-control-jburg-v1809h
Delivering Modern Data Protection for VMware Environments
Data Protection Modernization - Restore, Reuse, Reinvent
A Winning Combination: IBM Storage and VMware
IBM Storage at FIS InFocus 2019
IBM Power Systems at FIS InFocus 2019
S104877 cdm-data-reuse-jburg-v1809d
IBM in Surveillance: Solutions that Deliver Innovation
S104875 nightmares-dreams-spectrum-control-jburg-v1809h

What's hot (20)

PPTX
Delivering Backup as a service
 
PDF
S104876 ibm-cos-jburg-v1809b
PDF
Optimize Your VMware SDDC with IBM Infrastructure
PDF
Addressing VMware Data Backup and Availability Challenges with IBM Spectrum P...
PPTX
Modernizing your organization's data protection approach, with Yamen Alahmad
PPTX
Introducing Acronis Backup as a Service
PDF
Z111806 strengthen-security-sydney-v1910a
PDF
S104878 nvme-revolution-jburg-v1809b
PDF
Webinar NETGEAR - Acronis Backup 12 e ReadyCloud per il backup e l'accesso re...
PPTX
Acronis+IW_Webinar_10Nov2015
PDF
S104874 toe-pool-jburg-v1809e
PPTX
Achieving Storage Agility and Improved Economics
PPTX
Acronis presentation
PDF
S100297 ilm-archive-orlando-v1804c
PPTX
Build your own Cloud
PPTX
IBM Cloud Storage - Cleversafe
PDF
Acronis access for blaud event
PDF
PCTY 2012, Tivoli Storage Strategi og Portfolio Update v. Greg Tevis
PPTX
Virtustream presentation
PDF
Infinidat InfiniGuard
Delivering Backup as a service
 
S104876 ibm-cos-jburg-v1809b
Optimize Your VMware SDDC with IBM Infrastructure
Addressing VMware Data Backup and Availability Challenges with IBM Spectrum P...
Modernizing your organization's data protection approach, with Yamen Alahmad
Introducing Acronis Backup as a Service
Z111806 strengthen-security-sydney-v1910a
S104878 nvme-revolution-jburg-v1809b
Webinar NETGEAR - Acronis Backup 12 e ReadyCloud per il backup e l'accesso re...
Acronis+IW_Webinar_10Nov2015
S104874 toe-pool-jburg-v1809e
Achieving Storage Agility and Improved Economics
Acronis presentation
S100297 ilm-archive-orlando-v1804c
Build your own Cloud
IBM Cloud Storage - Cleversafe
Acronis access for blaud event
PCTY 2012, Tivoli Storage Strategi og Portfolio Update v. Greg Tevis
Virtustream presentation
Infinidat InfiniGuard
Ad

Similar to Unlock Real Value from Back Up Data with IBM Spectrum Protect Plus (20)

PPSX
IBM: Cognitive Security Transformation for the Enrgy Sector
PDF
IBM Spectrum Protect and IBM Spectrum Protect Plus - What's new! June '18
PDF
S200516 copy-data-management-ist2020-v2001c
PPTX
Backup as a service client presentation
PDF
IBM Security SaaS IaaS and PaaS
PDF
04 empalis -ibm_spectrum_protect_-_strategy_and_directions
PDF
5 reasons to modernize your backup infrastructure backup and beyond
PDF
Cutting Through the Software License Jungle: Stay Safe and Control Costs
PPTX
Disaster Recovery using Spectrum Scale Active File Management
PPTX
Ibm spectrum storage protecion
PDF
Big Data Requires Big Protection
PDF
3 Enablers of Successful Cyber Attacks and How to Thwart Them
PPTX
Fernando Imperiale - Una aguja en el pajar
PPTX
Fernando Imperiale - Una aguja en el pajar
PPT
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
PDF
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
PDF
Ibm spectrum protect
PPTX
Mobility 101 : Provision
PDF
S ss0884 sds-what-why-how-edge2015-v7
PDF
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
IBM: Cognitive Security Transformation for the Enrgy Sector
IBM Spectrum Protect and IBM Spectrum Protect Plus - What's new! June '18
S200516 copy-data-management-ist2020-v2001c
Backup as a service client presentation
IBM Security SaaS IaaS and PaaS
04 empalis -ibm_spectrum_protect_-_strategy_and_directions
5 reasons to modernize your backup infrastructure backup and beyond
Cutting Through the Software License Jungle: Stay Safe and Control Costs
Disaster Recovery using Spectrum Scale Active File Management
Ibm spectrum storage protecion
Big Data Requires Big Protection
3 Enablers of Successful Cyber Attacks and How to Thwart Them
Fernando Imperiale - Una aguja en el pajar
Fernando Imperiale - Una aguja en el pajar
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Ibm spectrum protect
Mobility 101 : Provision
S ss0884 sds-what-why-how-edge2015-v7
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Ad

More from Paula Koziol (15)

PDF
Sizing Splunk SmartStore - Spend Less and Get More Out of Splunk
PDF
AI Scalability for the Next Decade
PDF
IBM Storage for SAP HANA Deployments
PDF
IBM Storage at Fiserv Forum 2018
PDF
IBM Storage at FIS Connect 2018
PDF
IBM & Veeam: Bridging the availability gap
PDF
Transform to Cognitive Healthcare with IBM Software Defined Infrastructure an...
PDF
Accelerate Your Signature Banking Applications with IBM Storage Offerings
PDF
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
PDF
IBM Storage and VMware – A Winning Combination
PDF
Scalable Data Computing for Healthcare and Life Sciences Industry
PDF
Future Proof Your Data: IBM Storage at VeeamON
PDF
IBM Storage at SAPPHIRE 2017
PDF
POWER8 the x86 Server Farm - IBM Business Partners use POWER8 to Lower Client...
PDF
Why You Should Consider Linux on IBM POWER8 - How IBM Partners are Driving Bu...
Sizing Splunk SmartStore - Spend Less and Get More Out of Splunk
AI Scalability for the Next Decade
IBM Storage for SAP HANA Deployments
IBM Storage at Fiserv Forum 2018
IBM Storage at FIS Connect 2018
IBM & Veeam: Bridging the availability gap
Transform to Cognitive Healthcare with IBM Software Defined Infrastructure an...
Accelerate Your Signature Banking Applications with IBM Storage Offerings
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
IBM Storage and VMware – A Winning Combination
Scalable Data Computing for Healthcare and Life Sciences Industry
Future Proof Your Data: IBM Storage at VeeamON
IBM Storage at SAPPHIRE 2017
POWER8 the x86 Server Farm - IBM Business Partners use POWER8 to Lower Client...
Why You Should Consider Linux on IBM POWER8 - How IBM Partners are Driving Bu...

Recently uploaded (20)

PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
A Presentation on Artificial Intelligence
PDF
cuic standard and advanced reporting.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Big Data Technologies - Introduction.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Encapsulation theory and applications.pdf
PPT
Teaching material agriculture food technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Cloud computing and distributed systems.
PDF
KodekX | Application Modernization Development
Mobile App Security Testing_ A Comprehensive Guide.pdf
Electronic commerce courselecture one. Pdf
Chapter 3 Spatial Domain Image Processing.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
A Presentation on Artificial Intelligence
cuic standard and advanced reporting.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Big Data Technologies - Introduction.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
NewMind AI Monthly Chronicles - July 2025
Encapsulation theory and applications.pdf
Teaching material agriculture food technology
Per capita expenditure prediction using model stacking based on satellite ima...
Digital-Transformation-Roadmap-for-Companies.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Cloud computing and distributed systems.
KodekX | Application Modernization Development

Unlock Real Value from Back Up Data with IBM Spectrum Protect Plus

  • 1. Unlock real value from back up data with IBM Spectrum Protect Plus Marco van Gils March 21, 2019 Client Technical Specialist IBM Storage Marco_van_gils@nl.ibm.com #NLVMUG | MARCH 21, 2019
  • 2. Today’s Key Data Protection Trends Application / Data Recovery Data availability Application / Data Reuse Utilize data for new routes to market Disaster Recovery Recovering from a minor to major data loss Business Continuity Reducing the risk to the business, employees, market perception Cyber Resiliency Recover the business from a compromised attack 01 02 03 05 04 #NLVMUG | MARCH 21, 2019
  • 3. Why Modernize Backup? Lower Costs Improved Performance Simple / SLA Management Enhanced Business Agility Multi Cloud Enablement #NLVMUG | MARCH 21, 2019
  • 4. The Phases and Processes of Data Access Data Management / Operational Recovery Modernize and expanded use cases with instant data access, instant recovery leveraging snapshots Backup Traditional backup / recovery using streaming backups Archive Long-term data retention / compliance, corporate governance #NLVMUG | MARCH 21, 2019
  • 5. Spectrum Protect Plus – 10.1.3 • Supports ̶ VMware & Hyper-V ̶ MS SQL, Oracle, DB2, MongoDB, MS Exchange Server (all on physical / virtual systems) • Primary data reuse use cases ̶ Data Protection / Recovery ̶ Test/Dev, DevOps, Reporting, Analytics, etc… The enterprise-proven data protection, data reuse solution from IBM for multiple use cases Backup Data Made Useful #NLVMUG | MARCH 21, 2019
  • 6. What's New in 10.1.3? • Application Support - MongoDB – 3.6 / 4.0 – Community and Enterprise - Microsoft Exchange Server – 2013 CU2, 2016, 2019 – Includes item-level restores • Optimized offload to Spectrum Protect – no need for SP4VE any longer • Off-load to Object Storage – IBM COS, IBM COS Worm, Amazon S3, Microsoft Azure • High Availability of the Spectrum Protect Plus server for both VMware and Hyper-V implementations • Enhanced RESTful APIs – faster time to value around reporting / analytics NEW #NLVMUG | MARCH 21, 2019
  • 7. Spectrum Protect Plus & IBM COS – Cyber Resiliency • Spectrum Protect 10.1.3 can offload data to IBM COS and COS WORM storage via S3 ̶ Set through single SLA policy • Data protection to IBM COS WORM is key to any cyber resiliency strategy ̶ Offload to immutable storage ̶ “Air-gap” like capabilities ̶ Data cannot be deleted or changed • Utilize offload to IBM COS for off-prem DR ̶ Get data off-site in the event of a disaster ̶ Recover data in multiple locations #NLVMUG | MARCH 21, 2019
  • 8. Spectrum Protect Plus – Modern Data Protection Easy to Deploy and Manage Immediate ROI Intuitive User Interface Lower OpEx Software Defined Software-defined Proactive Backup Catalog Automated Data Protection Instant Recovery Data Access Lowest RTO Self-service – RBAC Flexible Management Automation Orchestration DevOps, Dev-Test RESTful APIs Application Integration #NLVMUG | MARCH 21, 2019
  • 9. New Protection / Reuse Attributes Leading to Real Business Value Instant Data Recovery Data snapshots stored in native format Instant recovery from multiple recovery points Agentless & Efficient VM APIs for agentless deployment Incremental forever, compression and dedupe built in Simple, Easy, Modern UI Recovery-driven simple management *Easy to use, new UX SLA, SLO Based Data Catalog Scalable MongoDB Google-like Search interface Find data quickly 13 #NLVMUG | MARCH 21, 2019
  • 10. Cloud-like Agility Deliver data / systems on demand or via schedule Application, database & VM centric templates New Protection / Reuse Attributes Leading to Real Business Value End-user Self Service Secure Roles Based Access Controls (RBAC) Right data, right people, right time, right location Secure Data, No Interference Recover in a fenced environment Rename databases and mountpoints *New vSnap encryption Network remapping Data Delivered as Code Infrastructure / Database as a service RESTful APIs Integration with DevOps tools 16 #NLVMUG | MARCH 21, 2019
  • 11. Rapid Data & System Recovery Native-format data for instant access Application-aware recovery New Protection / Reuse Attributes Leading to Real Business Value Service Modernization Data-as-a-Service Task automation Extend to the Cloud Regulatory Compliance Integration with Spectrum Protect ensures corporate governance / compliance Data Reuse Speed application delivery cycles Feed reporting and analytics engines 19 #NLVMUG | MARCH 21, 2019
  • 12. One Workflow, Multiple Use Cases Hypervisor Run on-premises or in IBM Cloud Policies, Catalog Spectrum Protect Plus Server Backup Admin Gold SLA Silver SLA Bronze SLA Policy-Based Management VM Admin Developer Help Desk Roles-Based AccessHypervisor Physical Servers (Protects applications running on physical and virtual servers, including Oracle/SQL/Db2/MongoDB/Exchange) Copy Repository vSnap Server Local Data Center Instant Recovery and Multi-Purpose Data Reuse API Calls Copy Repository vSnap Server Physical Servers Remote Data Center Hypervisor S3 Offload to 21 #NLVMUG | MARCH 21, 2019
  • 13. RE-invent Your Business • Modernize your data protection environment - Lower your data protection costs - Improve your business SLAs - Elevate your staff - Exploit your data - Enable the cloud #NLVMUG | MARCH 21, 2019
  • 14. © Copyright IBM Corporation 2019. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party. THANK YOU