Dynamic Infrastructure Cross IBM Sales Play

advertisement
Dynamic Infrastructure Cross IBM Sales
Play - Information Infrastructure
by Brad Johns, Eileen Maroney and Alan Marin
Welcome to the introduction to Selling the Information Infrastructure Education
Conference Call. My name is Brad Johns and I and the Program Director for Enterprise
Storage and Marketing for System Storage. It is my pleasure to have the opportunity to
spend some time with you today to talk about the Information Infrastructure and how to
capitalize on the opportunity in your territory.
This is going to be a short but informative session with the objective of coining you
with the information infrastructure and enabling you to capitalize on this important
topic in your territory. This is the first module on selling Information Infrastructure.
There are four others that are going to go into greater detail, one on each of the
information infrastructure components.
Let’s see what we will be discussing in this session.
Let’s turn to the next page.
We have a lot of information to share and we are going to discuss the following. First
we will take a look at how the information infrastructure relates relative to the Dynamic
Infrastructure which was announced on February 9. Then we will talk about the
information management challenges our customers are facing in today’s very difficult
business environment. We are going to highlight the IBM competitive differentiators.
We have a good story to tell and have a clear differentiation strategy versus the
competition. We are also going to cover 4 customer success stories about highlight the
application of the information infrastructure to our clients business problems. Then we
are going to turn to selling the information infrastructure including a straightforward
sales strategy that includes key questions to ask our customers and decision trees to help
the customer discussion.
We are also going to discuss sales resources. Since the Information Infrastructure was
announced in September of last year we have a wealth of information. We have really
focused our initial efforts this year on making it more easily available. We are going to
discuss additional education that we will have available for your use to go into greater
detail on each of the four pillars of the information infrastructure. Finally were going to
discuss the next steps that we recommend for helping take advantage of the information
opportunity in your territory.
Let’s turn to the next page to talk about how the information infrastructure relates to the
dynamic infrastructure.
We have a lot of information to share and we are going to discuss the following. First
we will take a look at how the information infrastructure relates relative to the Dynamic
Infrastructure which was announced on February 9. Then we will talk about the
information management challenges our customers are facing in today’s very difficult
business environment. We are going to highlight the IBM competitive differentiators.
We have a good story to tell and have a clear differentiation strategy versus the
competition. We are also going to cover 4 customer success stories about highlight the
application of the information infrastructure to our clients business problems. Then we
are going to turn to selling the information infrastructure including a straightforward
sales strategy that includes key questions to ask our customers and decision trees to help
the customer discussion.
We are also going to discuss sales resources. Since the Information Infrastructure was
announced in September of last year we have a wealth of information. We have really
focused our initial efforts this year on making it more easily available. We are going to
discuss additional education that we will have available for your use to go into greater
detail on each of the four pillars of the information infrastructure. Finally were going to
discuss the next steps that we recommend for helping take advantage of the information
opportunity in your territory.
Let’s turn to the next page to talk about how the information infrastructure relates to the
dynamic infrastructure.
Despite the challenging business environment that we are currently in, our customers
continue to see a rapid growth in the amount of data that is being created and stored.
IDC estimates that our customers are seeing a 54% compound annual growth rate in
their storage needs and this is going to continue through 2012. They need to absorb this
tremendous growth within their tight information-technology budgets.
To make this even more of an issue the type of data that our customers are being asked
to manage is changing. In fact up to 80% of data is unstructured content and that is emails, videos and image files. While this kind of information existed before it was
largely confined to departmental silos but now it must be managed and stored with the
same care as traditional structured information. Some industries are hyper examples of
this kind of growth. For example it’s estimated that modern testing procedures that
utilize 3-D digital modeling are driving medical images growth such that it will take a
30% of the world storage in 2010.
Let’s see what this means to our customers on the next page.
The rapid growth of information presents our customers with significant business
challenges. They are being required to store and manage more data to comply with
compliance and legal requirements and yet their budgets are not growing. In addition
there is a significant business value, a potentially greater revenue associated with this
information but it can only be extracted if it’s managed and controlled.
Our customers challenges fall in four main areas, information compliance, information
availability, information retention and information security. Some examples of these
challenges include compliance cost which in United States can be very high with legal
discovery costing between $150,000 and $250,000 per instance and large corporations
can have multiple events taking place at the same time.
Regarding information availability, 59% of all managers surveyed in a recent poll say
that they could not find the data that they were looking for to make a decision and made
the decision anyway. Our customers are retaining worthless information. Customers
are finding that up to 37% of the data that they are starring is expired or inactive and yet
they continue to bear the cost of storing and managing this data even though it’s not
needed.
Of course the security concerns are paramount with over 84% of security breaches
committed by internal resources. Organizations typically meet the information
challenge with a balanced approach across all of these different tiers.
Let’s turn to the next page to see how the information infrastructure can help our clients.
Our customer’s information infrastructure today are near breaking point. They can’t
handle the day-to-day demands that are now being dictated to them by the people in
charge and that is the end-user consumer. Each consumer today has an electronic
footprint of about 1 TB of data, music, medical records, social media, cell phones and
more. That’s the individual’s digital footprints. IBM is estimating that this is going to
grow to 16 TB per person by 2020.
Today’s static data is managed in silos where it just sits. Innovative companies know
that they must employ new kinds of technologies to offer dynamic services; information
that follows individuals wherever they go in a cloud environment. With the explosion
of mobile web, connected sensors everywhere from cars to pipelines, online medical
records and the growth of Web 2.0 data and social networking, and our customers
infrastructures need to retool now to be ready.
There are four main areas of concern for companies and IBM is responding to those. In
response to these problems we are outlining three critical elements for the information
infrastructure that focuses on the management consolidation and security pain points for
our clients in four areas, compliance, availability, retention and security. The
compliance burden will only continue to grow as customers provide more web-based
services to a diverse set of users including employees, customers and business partners.
The reputational risk that come with the poorest publicity of noncompliance has created
the most powerful incentive for stronger information and security compliance and larger
customers are now starting to experience pain associated with the high cost of
compliance. They know they have to deal with e-discovery and are dealing with that
but per Gartner most Fortune 100 companies have 86 cases pending at one time and are
averaging over 1 ½ million dollars per case. They are spending this over and over
again.
Regarding availability today’s infrastructure was not designed to efficiently manage the
estimated 2 billion people that will be on the web by 2011. Especially considering the
users are already uploading more than 10 hours of video to UTube every minute. Cost
effective scale up technologies are needed to enable Internet scale and speed for the
management of vast amounts of online information coupled with continuous access.
Organizations must be prepared for this new phase of cloud computing giving
consumers access to data systems remotely from any device anywhere.
Regarding retention, today’s information infrastructure suffers from inefficiencies in
both duplicate sources of the same information and excessive energy and cooling costs.
In fact analysts have said that up to 50% of data centers will run out of power and space
this year. Our customers are looking and need retention systems to eliminate duplicate
data coupled with green cost efficient archival solutions for longer-term storage.
Regarding security, our customers are looking to ensure that the information at the data
center is secure and being accessed only by those authorized. This is a top concern for
data centers large and small regardless of the economic environment. A recent data
center hacker cost one company more than $60 million in damages due to the stealing of
data and non-authorized use of credit card information.
Let’s turn to the next page.
IBM’s information infrastructure isn’t just about helping our clients enhance their core
capabilities, it’s also about bringing game changing technologies to market to help our
clients needs and exceed expectations despite the explosion of information. IBM has
clearly differentiated value versus the competition. Let’s briefly review some of the
competitive differentiators of the IBM information infrastructure.
Let’s start at the center. IBM is an industry leader in providing comprehensive proven
consulting and services. These cover all aspects of the information infrastructure. IBM
provides consulting and services to help our clients address the highest priority needs.
Turning to our storage products, IBM just rolled out an enterprise class set of
deduplication appliances based on the ProtecTier software technology acquired with the
Diligent acquisition. This offer to reduce the amount of storage required to store or
customers information by a factor of up to 25 times.
We take our enterprise disk storage system, the DS8000, it’s the first to market with full
disk encryption. We also just recently announced new solid-state drives for very high
performance applications and is support for 1 TB SATA disk drives that now allow a
single DS8000 to support up to 1 petabyte of capacity.
The information infrastructure also includes important software. Our Tivoli storage
manager data protection software was recently enhanced to include integrated data
deduplication. In addition it has greater scalability due to the exploitation of DB2
databases for meta data storage. As a result it can store twice as many objects as the
previous release.
We also introduced a new entry model for an industry-leading XIV storage systems.
These new storage systems utilize the architecture acquired with the XIV acquisition
and they can reduce power and cooling costs up to 80% versus traditional storage
architectures.
When it comes to storage virtualization IBM is the clear industry leader with the SAN
Volume Controller. We shipped over 14,000 units and it has demonstrated the ability to
save our customers up to 50% of their administrative and management costs while
increasing their disk storage utilization by up to 30%. We have also brought to the
marketplace a set of comprehensive integrated solutions to help our clients meet the
unique needs of the medical industry for managing very large amounts of information.
Now let’s see how some IBM customers have taken advantage of the IBM infrastructure
to improve their IT systems services, reduce costs and improve a lower business risk.
First is the city of Honolulu. They were saddled with some very old IT systems. In fact
their multiple vehicle system for 35 years old and the financial systems that were being
used for over 20 years old. It was very difficult to maintain these systems. Their
availability and services just weren’t up to par. In addition they had no disaster
recovery capabilities.
An IBM business partner Serious Computing work with the industry ISVs to implement
a new ERP application and implement a completely new architecture that included IBM
Power servers Z Series mainframes as well is the SAN Volume Controller, DS8000 and
IBM tape storage. As a result the city and county are able to achieve much more
reliable levels of service and simultaneously meet their internal audit requirements. The
city and County of Honolulu were recently named the country’s biggest mover by Inc.
Magazine in part because of these information technology changes.
Another customers success was Iowa Health. They had recently implemented a new tax
system for their patient record system management. It was a result in a dramatic growth
in their storage needs. This growth was across several geographically dispersed data
centers and they needed some way to scale capacity to meet their information
availability needs while providing higher performance for local patient records retrieval.
In just over three weeks HIS implemented the IBM Grid Archiving Solution or GMAS
across the Cedar Falls in Cedar Rapids data centers to gain an automated high-capacity
multi-site storage archive. The solution enables Iowa Health multiple facilities to
virtually connect across these sites and to optimize their enterprise storage capability.
The GMAS solution offered automated full system redundancy and disaster recovery
capabilities across these sites.
Another successful customer with the University of Auckland. This customer had been
adding servers and storage over years as individual requirements arrived. It had finally
expanded to a breaking point with over 350 servers each with its own dedicated disk
storage. The customer was running out of power, space and cooling and they had
trapped storage in functional Silos behind the servers. Their IT services decided to
consolidate and virtualize all layers of the university’s infrastructure including storage
and servers emanating the one to one relationship between applications and physical
servers and then enabling centralized administration of the storage area networks.
The IBM systems storage solution provided the University of Auckland a reduction in
the data center footprint through the consolidation of servers and an improvement of the
storage utilization while simultaneously reducing power and cooling costs.
Finally I last customer is Is4 IT Srvices. They are an information service provider and
they were faced with rapidly growing amounts of information that needed to be stored
to meet their clients information retention needs. They turned to IBM to help and we
were able to help them more effectively manage the dramatic growth of data they had
been experiencing with their information retention and environment.
Let’s take a look at the next page to talk about selling the IBM information
infrastructure.
The information infrastructure is truly a cross industry play. All our customers buy
storage. There requirements very certainly from industry to industry and from
application to application but when servers are installed storage is installed also.
Typically the sponsor for information infrastructure engagement would be in the
information technology arena. It could be the CIO or one of the reporting departments.
However some of the information infrastructure needs such as infrastructure retention
have brought organizational impact and the decision-makers could be line of business
executives and corporate compliance officers.
Let’s take a look at some of the indicators of a customer’s needs for improving their
information infrastructure. If a customer is concerned about one or more of these, they
are a prospect for a more detailed discussion. For example is the customer concerned
about cost effectively managing the explosion of information? Are they concerned
about delivering continuous and reliable access to the information that they have?
Perhaps they’re concerned about protecting data and enabling secured sharing of
information. Other customers may be concerned about retaining information to support
regulatory and compliance and legal discovery requirements and yet others are
concerned about reducing reputation risks and audit deficiencies.
I have listed here some key questions that you could ask your customers to help you
explore if an information infrastructure opportunity exists. I won’t review them all here
but you can see that they are designed to help you identify customer’s needs for
improving their information infrastructure. Once we have identified these needs you
can see that we have a broad portfolio of offerings to help meet the customer’s
requirements.
Let’s turn to the next page.
IBM has the broadest portfolio of information infrastructure offerings in the industry.
This is not an exhaustive list got here on this page but I have listed some of the
highlighted components. Let me discuss just a few of the services, software and storage
offerings available to help your clients need their information needs.
For example we have IBM STG information infrastructure storage optimization studies
or workshops that can help clients identify their major information infrastructure issues.
We also have GTS consulting offerings that include migration services based on the
Softek technology as well as rapid management complexity factor assessment based on
the Novus acquisition. We also have storage enterprise research planning utilization
studies and we also have support for enterprise archive services. It’s truly a rich set of
offerings across both STG and GTS to help identify the customer’s specific information
infrastructure needs. These are unique industry-leading capabilities that we can bring to
the table. They are well-suited for customers that might not have the time or the money
to evaluate their environment and develop an overall strategy.
For customers with more specific needs we have a set of storage related software
offerings from Tivoli including Tivoli Storage Manager for their data protection
requirements, Tivoli Productivity Center for the storage management and the new
Tivoli Key Lifecycle Manager, an essential component of the data at risk security
strategy. Of course as I mentioned earlier we have a comprehensive set of storage
offerings ranging from disk storage to deduplication appliances, to tape, storage to SAN
fabrics, to network filers.
To help you with these offerings we’ve developed a broad set of sales resources. I have
a couple of quick entry points here identified. The information infrastructure wiki
which I’ve pointed you to because it provides a quick and easy capability to access all
the information across all the different offerings including customer references. We
also have an information infrastructure overview sales kit and an IBM business partner
equivalent on Partner World. As I mentioned we have sales offerings that are now
being offered throughout Tucson and Mainz and recently (inaudible) briefing centers a
swell as the lab services offerings for assessments and workshops.
We have also developed sales kits for each of the information infrastructure offerings
that include selling reference guides, customer ready presentations and more.
Let’s take a look at some of these resources.
First let’s take a look at the typical selling process. What we have identified here is
how we might approach a sales opportunity. We have divided the initial selling process
into two steps. First is the Initial Opportunity Identification. The goal here is to
identify one or more of the CARS areas for continued qualification. There are a number
of potential methods available to help you assess how best to approach your customer’s
information infrastructure requirements.
At the top of the list includes an easy to use assessment tool that we will be rolling out
at the beginning of the second quarter. We also have the information infrastructure
workshop that I mentioned that are available in selected briefing centers. These now
include Tucson, Mainz and (inaudible). We can also engage our clients in information
infrastructure storage optimization or workshops or studies using STG Lab Services and
of course as I mentioned earlier we have several GTS offerings.
Once we have identified a specific pain points, in phase 2 we have additional offerings.
We are providing additional assessment tools for each of the four focused areas that we
referred to as CARS, compliance, availability, retention and security. In addition some
of these areas have additional services and consulting. There is an extensive set of
deliverables and education available to help you in your sales efforts. In fact let’s turn
the page and I will highlight some of them.
This chart touches on some of the key deliverables that are available today. There are
hot links and they are listed here. If you put your display and screen show mode they
will take you directly to each of them. We’ve organized links to buy rouse starting with
information infrastructure and then each of the four focus areas. For each row we have
links that include references, education modules, selling focus guides, conversation
roadmaps, data sheets and white papers.
The question is now that you’ve seen the resources, how best should we proceed?
Let’s turn to the next page.
We suggest the following. First take a look at the information infrastructure wiki. It
provides links to a wealth of information and education. Secondly the information
infrastructure overview sales kits has a wealth of material and also pointers to each of
the CARS themes. If your clients have particular interest in one of the focus areas or
one or more of the focus areas in the information infrastructure you might consider
going to the sales kit for that particular component and completely additional education
associated with it.
We are also rolling out a new set of assessment tools that I mentioned previously that
can help you sit with your client and quickly identify their major areas of concern.
These tools will be populated into the wiki as well as each of the sales kits over the
coming weeks. They are designed to be easy to use and will be available to both
IBMers and business partners. Of course we recommend the use of GTS and STG
services to help you identify specific customer needs and progress the sale.
I would like to thank you for your time today. It’s been a pleasure to have this
opportunity to talk about the information infrastructure and how best to capitalize on the
opportunity in 2009.
Best of luck to you in your sales efforts.
This will conclude today’s call.
Thank you.
Welcome to today’s Information Compliance Education Module. My name is Brad
Johns and I am Program Director for Enterprise Storage Marketing. Compliance
continues to represent a challenge for many organizations. In fact analysts say there are
over 20,000 compliance regulations worldwide and this number is growing. Regardless
of the specific regulatory pressures today and which ever industry clients belong to
there are two fundamental ingredients in all compliance initiatives. The first ingredient
is concern with behavior of the organization. It establishes the control and mechanisms
required for the organization to behave in a manner that is legal, ethical in accordance
with the laws. These are internal company policies and processes.
The second ingredient looks after the information itself and that is what I will focus on
in this recording.
Let’s see what we mean by information compliance.
Information compliance is a broad term and it entails technologies, processes and
services to capture, collect, manage and retain all relevant business information with
security and integrity. The first step in any compliance project is a secure environment.
Information and network security is considered a prerequisite to any compliance
initiative.
Following that step is the information compliance process. It is establishing the ability
to defend the company in case of a legal or regulatory challenge. To achieve this clients
need to collect, manage and retain and secure all relevant information that needs to be
available to support their events. In addition clients need to protect all vital information
that is a prerequisite for their business to operate.
The first step is to establish content collection and records management mechanisms
together with the necessary tools to retrieve and present that information when
challenged. Data collection and classification is fundamental to robust compliance that
need discovery support. Once the critical information collection process has been
established the next challenge is to start influencing compliance controls proactively
through an automated policy-based information management retention process. The
client needs a retention system that will enforce the policies and make sure that they are
secure, protected from external threats so that information integrity is not compromised.
The solution to this include non-erasable and non-rewritable and write-once and read
only technology. Data encryption is also key for information integrity and authenticity.
Clients need to be of the search and retrieve the critical business information when
required by legal. A robust
e-discovery tool is very important.
In summary information compliance is comprised of records management and content
collection mechanisms with policy driven records management retention, secure and
protected information both in motion and at rest that leverages capabilities of data
encryption and protective storage retention systems. It ensures information integrity
and authenticity until end of the retention period and be able to track and audit the
information and be able to discover and furnish information upon request.
Let’s go to the next page.
The enterprise content explosion and variety of information types is overwhelming
companies today. This leads to information chaos where there are multiple copies of
unsecured or untraceable information not properly index without the control and
management and stored on silos. Some information is burn digital and some
information is printed paper all of which leads to increased mitigation risk and cost.
There are also manual policies and processes which may or may not be followed, aren’t
enforced or audited. This contributes to an overall lack of control, increased business
risk and causes high operational processing costs.
Let’s take a look at the business environment.
I am sure it comes as no surprise that we live in the most litigious business environment
in history. Although the US has less than 5% of the world’s population, it nonetheless
has 80% of the worlds lawyers. Each day, on average, 82,000 lawsuits are filed in the
US, most involving businesses, and that includes businesses of every size. That’s 30
million new lawsuits each year, costing tens of billions of dollars in litigation costs for
plaintiffs, defendants and courts alike.
What often does come as a surprise is that 75% of these litigation costs are for legal
discovery process, satisfying the demands placed by plaintiffs and defendants on each
other to produce evidence in the form of information these entities retain either out of
corporate governance policy or, increasingly in response to government regulations that
dictate what must be kept, in what form and for how long.
Among the better known of these regulations are Sarbanes-Oxley pertaining to financial
reporting, HIPPA with direct impact on the healthcare industry, and the Patriot Act,
which effects nearly everyone. But those are but a few examples of the 14,000
information-retention regulations in force in the US and the 22,000 in force worldwide.
More regulations are sure to follow. Needless to say, the sheer volume of information
retained is skyrocketing and the ability of opposing parties in a lawsuit to demand
access to this growing ocean of information is reinforced by recent amendments to the
Federal Rules of Civil Procedure.
So how should companies address this risk and obtain compliance?
As I mentioned before there are multiple key aspects that are critical to achieve and
sustain business information compliance. The first crucial one is enterprise Content
Management. This slide shows the IBM strategy for enterprise content, appliance and
discovery. Our view is that today many organizations when it comes to retain or
managing information for retention or for compliance create a kind of digital landfill
situation or in other words information chaos.
This means that they have lots and lots of different types of digital and electronic
content. As you see in the picture it could be e-mail but it’s not just e-mail. It could be
office documents like Microsoft Word or PowerPoint documents that are files ystems.
It could be things that are stored on people’s desktops and it could be some of the
collaborative systems like share point. There’s all kinds of additional communication
and collaboration mechanisms like instant messages which are shown here even
extending to wiki’s, blogs, recorded voice mails or transcription and rich media sources
such as video. All of this is generally stored somewhere and it might be on someone’s
hard drive but it’s a digital landfill because it’s all else there but it can’t be easily found.
It’s not classified and is not managed.
If you click you should see an arrow leading to a box that says content collection. The
first step in getting this information under control is to be able to collect it. By this we
mean to define policies and rules and provides and needs for the appropriate content to
be moved, copied or stuffed into an electronic content management repository. This
capability is provided by the IBM Family Content Collection and Archive Offerings.
Then if you click again what you want to be able to do is to manage that content
according to predefined policies that take the information to the right place. It might go
to the trash bin at the bottom if it’s something that doesn’t have to be retained for
compliance or could go into a repository and be records managed. It could also be
stored in a repository for e-discovery or for that matter it could go into a repository to be
analyzed and later mined. So content collection really facilitates all of these scenarios.
If you click again I described how advanced classification is really an adjunct to the
content collection in that what you would like to be able to do is to classify at a fairly
granular level to content as it flows through the system. I will give you an example of
two e-mails that might both contain the word sue and check. In one case it might be an
e-mail that says Sue I want to check in with you and see how your garden is doing.
This is a social email. The second email with different verbiage says we are being sued
because the check hasn’t come through. The advanced classification is needed in this
case to differentiate between those two e-mails and then ideally treat them differently.
To treat them differently by discarding one or to treat them differently by having
different retention policies and different management schedules around them.
If you click two more times you will see the other pieces of the lifecycle which is to
apply formal records management to the appropriate content. It doesn’t have to be to all
content but formal documents are things that have to be managed from a compliance
point of view and could be put under formal records control. Records management then
securely manages retention and disposition of the information in a controlled audited
manner.
Last but not least is a set of electronic discovery tools to help easily and quickly find
content in response if a legal discovery request is needed also. As you can see from the
picture all those boxes are part of what IBM calls the electronic content management.
All of the pieces, content collection, classification, records management and electronics
discovery, those are all core capabilities of the IBM enterprise content management
application. And you need to note that IBM ECM for short sits on top of an information
infrastructure stack to achieve full support of IBM’s vision around compliance.
The IBM information infrastructure stack provides a secure and protected storage
repository and then forces the policy set forth by the content and records management
systems. The repositories keep and preserve the information with integrity and security
throughout its lifecycle. During the information lifecycle we may need to leverage
different kinds of repositories due to the different price points and of the <longitivity>of
the information. Regardless the information needs to be retained and secured until the
end of its life cycle.
The IBM compliance warehouse for legal control is the first integrated, secure, audited,
solution that combines software, hardware and services in a unified environment to
enable organizations to achieve and sustain and improve compliance with legal and
compliance mandates while reducing costs, complexity and risk.
This is not a point solution for email only. It is an all encompassing legal control
solution that also manages instant messages, word processing, documents, spreadsheet,
databases, images, web pages, even the record of operational processes the information
has been through. In other words, all electronically stored information, which is
important, because all electronically stored information or ESI for short is discoverable.
Information is certifiable, audited, secured and fully managed. This includes lifecycle
management which ensures that information past its retention date is destroyed. As
we’ve seen, having too much unnecessary information on hand can be dangerous and
can also be costly. When litigation comes into the picture, the system initiates litigation
holds, identifying and sequestering relevant information in a secure litigation vault. The
process is automatic, infinitely repeatable and non-disruptive. It is far more economical
than alternative methods, and because of its speed, accuracy and reliability, it can help
businesses win cases.
Let’s take a look at some of the benefits for information compliant. By leveraging
solutions to achieve compliant clients can avoid the high cost, business disruption, lost
judgments and damages to their reputation. If the clients allow electronically stored
information is kept organized and search ready, it drives down costs and keeps the rest
of the organization running smoothly. Even paper documents can be stand into
electronically searchable form. This is often preferred and sometimes required by
courts.
Because they are compliant customers will stay out of legal hot water and avoid
sanctions and fines and because it’s automated and fast they can get extra time for early
case assessment, time to analyze search results and evaluate their best courses of action.
So how to approach your customer in identify an information compliant opportunity.
Let’s take a look at the decision tree on the next page.
Here you can see an overview of lifecycle of information compliance opportunity. At
the top left there are some key questions that need to be asked to identify if the
customer’s compliance problems are areas or requirements. You can see we have
identified several questions here that focus on the customers industry, how dare
managing their electronic records. Do they have a program for compliance? Do their
current applications provide audit trails for e-mail documents? What sort of procedure
for producing business records in case of an audit or discovery request does the
customer have? How did they ensure the integrity and security of the business records
so they can validate that they are in compliance? Does this is disposed of expired
documents and information as soon as policies allow?
If one or more of these questions are yes and the customer may be in information
compliance opportunity. You can see we have identified several following questions to
help pinpoint specific areas to start your information compliance sales efforts. At the
top we can talk about is the lack of corporate wide compliance strategy an issue for this
customer, in which case we may want to start with an enterprise compliance workshop
and introduce IBM compliance warehouse for legal control of an endpoint solution.
Is content and record management an issue? Does the customer provide required audit
trails? We can propose an IBM content and record management solution or introduce
the IBM compliance warehouse for legal control. I won’t take you through the other
questions but you can see by following this flow it will help pinpoint the specific
opportunity areas for you to pursue with your client.
We have established focal points for solution sales for information infrastructure in a
number of the geographies and I have identified them here. You can see at the top we
have electronic content management contacts. We have storage solution sales leaders.
We have archives solutions sales leaders which often can lead into areas of compliance.
We have services contacts for archive and storage optimization. We have our Briefing
Center contacts and we have the global technology services.
I would also like to point you to a number of important information sources to get more
in-depth knowledge on IBM’s information compliant solutions. First there is ibm.com
and you’ll see we have identified some specific links here with white papers that might
be useful as well as you can see the STG wiki which provides access to information
compliance related information.
With that, that will conclude today’s call. I would like to thank you for your
participation and look forward to working with you in 2009.
Hello and thanks for listening. Today’s presentation is hopefully going to give you
direction and assistance regarding how to sell information availability.
Let’s move to page 2.
I would also like to point you to a number of important information sources to get more
in-depth knowledge on IBM’s information compliant solutions. First there is ibm.com
and you’ll see we have identified some specific links here with white papers that might
be useful as well as you can see the STG wiki which provides access to information
compliance related information.
With that, that will conclude today’s call. I would like to thank you for your
participation and look forward to working with you in 2009.
Hello and thanks for listening. Today’s presentation is hopefully going to give you
direction and assistance regarding how to sell information availability.
Let’s move to page 2.
This presentation assumes you already listened to the how to sell information
infrastructure presentation. I will not be covering information infrastructure in general
or dynamic infrastructure but will focus on the four key aspects of information
availability to target customers, their pain points and questions and tools you can use to
qualify and close opportunities.
I will also cover the focused solutions you should be proposing for each of the key
availability aspects. This will not be an in-depth product presentation so at the end I
have included links to resources that you may need to educate yourselves further on
information availability in the specific solutions we are recommending.
Please turn to page 3.
At the end of this presentation you should be able to:
• Understand the four key aspects of information availability
• Identify the opportunities for each of these aspects
• Propose the appropriate offerings for each opportunity
• Finally you should be able to find the resources available to help get you started
Let’s turn to page 4.
There are four key aspects to the information availability strategy. The first is business
continuity. With businesses becoming more complex and interconnected the risk and
cost of disruption extends well beyond IT to every aspect of business processes.
Customers need solutions that can minimize or eliminate downtime.
Next is a storage virtualization. Our customers are being asked to drive higher and
higher service levels managing a complex and growing storage environment while
holding the line on resource and infrastructure costs. Virtualization is the key
technology and can help to satisfy these requirements.
Also growing complexity can be damaging to an enterprise resulting in more system
downtime, higher cost and inferior customer service. IBM offers end to end technology
and services to help customers simplify the management of their infrastructure to help
enhance information availability.
Finally is data protection. Organizations are wrestling with the impact of uncontrolled
needs for data backup and restoration caused by accelerating data accrual rates. IBM
offers solutions that can protect customers from the risk of data loss and help reduce
complexity, manage costs and address compliance with data retention and availability
requirements.
Now turn to page 5 and we will take a look at business continuity.
The good news about information availability is that every large enterprise and
midmarket company is a prospect. Every business needs to mitigate the risk and make
sure their data is available and secure. Each of the following pages includes a list of
pain points and some qualifying questions that can help you open up a dialogue with
your customer. You also have the option of taking your customer through the business
continuity self-assessment tool on ibm.com to help them identify possible areas for
improvement. I have included a link at the bottom of the page.
Let’s move on to page 6.
Here are the pain points in qualifying questions for storage virtualization. Customers
need the ability to fully utilize storage and to be able to handle growth without requiring
additional hardware or administrative resources. There is a storage optimization selfassessment tool available on ibm.com that may help you when you are reviewing this
topic with your customer.
Let’s turn to page 7.
Infrastructure and storage management can help to improve the management and
simplify even the most complex storage environments. Along with these questions
there is a storage optimization self-assessment that is a good tool for analyzing your
customers needs in this area. You will see the link at the bottom of the page.
Let’s turn to page 8.
Now for data protection the focus is mainly on backup and restore ensuring that the
process minimizes the risk of data loss and possibly reduces redundant hardware and
management resources. There is an information security self assessment tool that can
be useful in your customer conversations in that link is at the bottom of the page.
Let’s turn to page 9.
The Availability Decision Tree assumes you work with your customer and have
identified availability as an area of concern. Using the qualifying questions or the selfassessment tools from the previous pages you should further identify this further aspect
of availability where the customer has an unaddressed pain point. If the customer has
issues in all four areas or is unsure where the weaknesses are in the storage
infrastructure you may want to start by proposing an information infrastructure storage
optimization workshop or study that will help to analyze the existing infrastructure and
will provide recommendations and supporting business plan.
We will look a bit deep at this offering on the next page.
If the customer’s main area of pain is business continuity and that is keeping data
continuously available during planned or unplanned outages in the customer is unsure
exactly where is problem lies, once again the storage optimization workshop or study
may be helpful to move the sale all along. If the client has a critical storage or backup
environment issue and needs a very rapid assessment to highlight specific areas in
which they need to improve their storage or backup environment with specific metrics
or the client needs to create a long-term storage or backup strategy but isn’t sure how to
begin, you might recommend a rapid management complexity factor study from GTS.
We will look closer at this option on the following pages.
Another option is it gives the TS7650 GAD ProtecTier that combines and virtual tape
library solution with in-line data de-duplication that enables significant savings in disk
requirements and cost. Finally the TS7700 virtualization engine that supports business
continuity for System z customers through grid connectivity and automated replication.
Depending on your customer’s skill level you may also proposed GTS implementation
services for desk and or for tape. Another option for less skilled customers is the GTS
transformation strategies service using <MTF>which helps customers develop an
effective IT storage growth and optimization plan and provides tactical short-term
activities that can lead to strategic long-range improvement.
Now for customers issues related to storage virtualization and storage management the
storage optimization workshop or study is also an appropriate offering to further define
where the issues exist. If the customer has a critical storage utilization visibility issue
you might recommend the remote SCRP utilization study. If you have a competitive
opportunity for DS8000, the data mobility solution’s partial no charge migration
offering will help you reduce the customers costs and eliminate downtime for migrating
the customer’s data.
For customers managing complex and growing storage environments while needing to
hold a line on resource and infrastructure costs, storage virtualization is the key
offering. SAN Volume Controller and DS3000, DS4000 and DS8000 disk products can
improve storage utilization by up to 30%. Storage administration and data movement
can be one of the largest causes of planned operation downtime and SVC practically
eliminates storage related downtime.
Along with SVC and disk you may recommend GTS implementation services and
storage and optimization services for storage virtualization and storage consolidation.
These assist customers in achieving better utilization of storage and sharing of data
across servers and clients while helping to lower the risks and costs.
For customer issues related to data protection once again you can propose the storage
optimization workshop or study or the rapid MCS play which focuses on backup. The
key offerings for data protection of the Tivoli storage management family of products in
the IBM tape product line. TSM protects customers from the risk of data loss and helps
reduce complexity, manage cost and address compliance with data retention and
availability. It also improves the business continuity by shortening backup and recovery
times and maximizing application availability with advanced data recovery management
technology.
IBM tape has unique attributes for helping customers protect and store their rep of the
growing amounts of information. It provides low cost storage and delivers data security
through encryption.
Please turn to page 10.
Let’s take a look at the information infrastructure storage optimization assessment
offerings from STG Lab Services. These offerings are provided at a lower cost than
most of the GTS full service offerings in a much shorter duration. They provide
customers with the following. First they provide an overview of the current state of the
customer’s IT storage infrastructure. They identify alternatives for approaches for
storage management. They recommend a strategy for improvement and they generate a
high-level business case.
The key areas of focus for these assessments can be storage virtualization and tiered
storage infrastructure, backup, restore and disaster recovery, archive retention,
compliance, information management, storage process, organization technology and
governance and finally data rationalization. Lab services are available in AG and
EMIA.
Let’s turn to page 10.
These are the three lead with sales plays from GTS. We spoke a little bit about them on
the earlier pages. The rapid management complexity factor study can be used if you
have a client opportunity where the client has a critical storage or backup environment
issue and need to very rapid assessments to highlight the specific areas in which they
need to improve their storage or backup environments with specific metrics or when the
client needs to create a long-term storage or backup strategy but isn’t sure how to begin.
The remote SERP utilization study can be used where the client has a critical storage
utilization visibility issue and is spending hours extracting storage and data usage
information from multiple tools and data sources to assess their storage environment,
management or service-level demands.
Finally the data mobility solutions partial no charge migration services or migrate 8 play
can be used if you have a competitive DS8000 oportunity. It will help you lower the
customer’s data center cost of moving to a new DS8000. I have included overviews and
links for contacts within GTS for these plays.
Please turn to page 12.
Here are the very high level competitive differentiators, the key availability solutions.
There is much more detailed information available in the individual product sales kits
and I’ve included links to each of these on the resources page.
Please turn to page 13.
This page includes a hot links to the key resources you will need for selling information
availability. For IBMers the information availability wiki is a great first stop for the
majority of relevant information. The wiki will be available to business partners in the
near future but for now I’ve included a link to the information availability section of the
dynamic infrastructure sales kit. This is a good first stop for you.
The information availability sales kit on both SSI and Partner World contains links to
the individual focused product sales kit. Additionally I have listed individual links for
presentations, educations, selling focused guides and white papers.
Let’s turn to page 14.
In April we will be providing individual web based assessment tools for information
infrastructure and for each of the CARS profile. They will be very similar to the storage
optimization self-assessment and the other self-assessment I showed you on earlier
pages. These will be useful tools for you to use with your customers to identify
opportunities.
Please turn to page 15.
Your next steps should be first to review the sales enablement information we’ve loaded
onto SSI and Partner World. It might be beneficial to review the availability seller
presentation and recording. If you don’t already have a good understanding of the focus
products from availability take a look at the product sales kits and review the quick
reference guide or the selling focused guides. When the information availability
assessment tool is available familiarize yourself with that and use it to guide your
customer discussions.
Finally consider using the studies and workshops from STG and GTS to help progress
you’re selling effort.
Please turn to page 16.
I hope this presentation has provided you with a focus and has given you good tools to
use when you’re identifying your opportunities to sell IBM Information Infrastructure.
Remember that IBM is ready to help and nobody can match IBM’s ability to help across
the spectrum of information infrastructure requirements.
Thank you for your time and good selling.
Welcome to the Addressing Information Retention Conference Call. My name is Brad
Johns and I am the Program Director for Enterprise Storage Marketing for System
Storage. It’s my pleasure to have the opportunity to spend time with you today to talk
about this important topic. It’s regarding the information infrastructure and specifically
we are going to be focusing today on information retention.
Information retention is one of the four focus areas associated with the information
infrastructure worldwide sales play. This is going to be a short but informative session.
Our objective is to point you with the information retention topic and enable you to help
your customers with this important dimension of information infrastructure.
I am also going to point you to additional education and resources to help you in your
sales efforts. Let’s see what’s driving our customers focus on information retention.
Despite the challenging business environment that we are in today our customers
continue to see a rapid growth in the amount of data that is being created and stored.
IDC estimates that our customers will experience a 54% compounded annual growth
rate in their storage needs through 2012. They need to manage this growth within their
tight IT budgets. To make this even more of a challenge the type of data that our
customers are being asked to manage is changing. In fact up to 80% of the data is
unstructured content that is e-mails, videos and images.
While this certainly existed before this kind of information was largely confined to
departmental applications but now it must be managed with the same care as the
traditional structured information that can be found in DB2 databases. There are four
drivers behind this growth. First is the growth of existing applications even something
as basic as e-mail continues to grow rapidly. For example it is estimated that in 2007
130 billion e-mails were sent on a daily basis. This is predicted to double by 2009
increasing to 276 billion e-mails per day.
The second major driver is new applications that are coming online and these tend to be
very information intensive applications like Web 2.0. For examples some of the social
networking sites. Some of the new applications contain a lot of digital content like
video that use a tremendous amount of storage. The third is what we call the multiplier
effect. Customers rarely retain a single copy of data nowadays and in fact this
information needs to be backed up. Copies are often sent off site for disaster recovery
purposes and often other copies are made for test and development. This can lead to a
multiplier effect. So for every instance of primary data it’s not unusual to see 5 to 10
copies of that same information being used for these purposes.
Finally there is also mergers and acquisitions. In today’s economy this is certainly
common with businesses acquiring other businesses and sometimes government
acquiring businesses. Mergers can drive storage growth as a participating entities
integrate their systems and determine that some data needs to be retained for past
purposes are rather for historical purposes.
Let’s turn the page to see how IBM can help our customers with this massive growth.
Last year we launched the information infrastructure strategy. This was a huge launch
for IBM system storage and our strategy is designed to help our customers provide
information efficiently, securely and reliably to their enterprise. We’ve identified some
questions that might be useful in helping you have a conversation with your clients on
this important subject.
Some of the questions that can be asked to start a conversation include first have you
evaluated the cost of storing and managing all the information in the enterprise? It’s not
really just the cost of the hardware. It includes people cost, power, cooling costs and it
looks of these costs for retention purposes over the course of years and maybe even
decades. These costs easily exceed the acquisition cost of the storage hardware. Our
goal here is to talk about all the cost of an information retention solution and look at it
over a long period of time.
The second question to consider is, is your infrastructure optimized for your retention
needs? This is a case of optimization and again not only of cost us being able to quickly
retrieve the information required. In fact it’s estimated that the average knowledge
workers spend 30% of their time just trying to retrieve information. We can help our
customers a lot if we can free up this time and allow them to put it to productive use.
Another area to look at is backup and recovery. We can ask our customers can you
backup and recover your servers fast and reliably enough? You might then think that
backup recovery has nothing to do with retention and we will talk a little bit about this
later in the session. A properly designed to archive system can reduce the amount of
information online in the production systems while reducing the amount of information
in the production systems this reduces the demand on the backup and recovery
processes.
Finally we want to determine where the customer is in terms of addressing these
requirements. We can ask are you addressing these requirements today? Maybe the
customer has already bought some hardware or software and they are looking to
implement it. Maybe they’re looking for something new or they are looking to have a
better use of their existing assets. The intent of this question is to assess where your
customer in addressing their information retention needs.
The essential point is to understand what they’ve done and where they are in terms of
understanding their business problems and then we can help them move from there.
Let’s see why our customers retain information in the first place.
Information retention is one of the more complex of the four information infrastructure
scenarios. The others are pretty self-explanatory. For example information security is
concerned about protecting the customer’s information. Information retention is often a
subject of some confusion. Let’s talk about why customers retain information to begin
with.
First they may keep information to support their daily business activities. For example
of banking enterprise might retain online images for their checks to improve customer
service capabilities. They might outsell keep information to extract business value from
it. For example data mining is a classic application where our clients retain information
to help them identify potential business development opportunities. Of course retention
management comes with a cost and one of the objectives of the overall strategy has to
be to manage the information consistent with its business value. Finally customers keep
information for cultural or historical reasons. For example governmental agencies will
often keep information regarding the historical origins of the country.
IBM has helped two specific customers with their archive needs and these are CocaCola and the Vatican. With Coca-Cola we help them digitized their 100 year history of
advertising. This is proven to be a tremendous new assets and they have used it in their
new marketing campaigns. We also work closely with the Vatican to digitize the books
and manuscripts within the Vatican Library. This has two advantages. First it
eliminates the need for physical handling of these historic manuscripts many which
would be completely irreplaceable. It also allows the information to be widely shared.
By putting this information on the Internet this could be provided to a great more many
people who would be interested in understanding the historical archives.
There are really three different focus areas within information retention. Let’s take a
look at what they are.
First is the storage infrastructure optimization. Our focus here is on providing access to
information from a most efficient, fastest manner consistent with the service level
requirements. Second is our focus on finding and managing information once it has
been stored. We are concerned about building indices to allow information to be
quickly and efficiently retrieved and then implementing business policies automatically
regarding of the treatment of information as it ages. Finally there is a unique and
special category of information that we call long-term retention. What we are thinking
about here is information that needs to be kept for decades and maybe even centuries.
Thinking through all the different considerations with keeping this information.
Let’s start with storage infrastructure optimization.
Storage optimization includes blending storage media types to reduce the overall cost
over long periods of time that includes energy and maintenance costs while meeting
service-level requirements for the information as it ages. Here we have an actual
customer example. This customer was evaluating the retention of information over a
10-year period for customer service application. Our key competitor of course with
EMC and their disk base (inaudible) offerings.
The customer was looking to store 250 TB of information and estimated that was
growing at about 25% per year. The analysis included all costs and not just the
hardware but included software, energy, maintenance as well as computer core costs.
You can see that the EMC all disk solution using low cost SATA disk was going to cost
over $6 million for this ten year period. This solution would have kept all 10 years of
data on the disk storage.
And IBM tape solution was also evaluated and this included IBM LTO generation for
tape drives and the TS3500 library. You can see that it was far less expensive costing
less than $1 million over this same period. However the tape solution had a retrieval
time would be one to two minutes and the customer was not satisfied with this response
time. So instead IBM proposed a blended tape and disk solution and in this case it was
the DR550. We have a number of other blended solutions to but the DR550 was used in
this case study.
The strategy was to keep 18 months of data on disk and then the other 9 ½ years worth
was kept on tape. This blended solution can provide the service level requirements of
disk 99% of the time and only 1% of the retrieval would actually come from the tape
library. You can see that the blended solution cost much less than the pure disk solution
but could meet this customers service level requirements. It’s also worth noting that the
blended solution with much greener than the complete disk solution and used for less
power and cooling over the evaluation period.
Let’s see why this is the case and why this is the IBM strategy.
One aspect of our storage optimization is policy-based automated movement of
information. While blended solutions have obvious financial benefits that they could
not be achieved by reliance on manual operations to migrate the data from the expensive
tier 1 storage to tape media or to lower cost storage of any kind. What is needed is an
automated process to automatically migrate the information. If you look at the upper
left hand graph you can see a typical access pattern for information. When the
information is relatively new the likelihood of retrieval is high but as the information
ages the probability of access drops and after one to two years the probability that any
specific file is going to be accessed is very low.
A storage optimization solution would automatically take advantage of this
phenomenon and migrate the information to less expensive media and you can see this
indicated on the lower left side of the chart. It moves this information automatically as
the information ages. A policy-based archiving solution also allows administrators to
define rules that identify which content should be moved to what type of storage and for
how long the content should be kept.
With these systems a customer compare precisely target content better suited to reside
an ultimate storage tiers as well as manage data replaced across storage tiers to match
service levels. As a result organizations can optimize storage usage while maintaining
end user productivity. Because the data outlives media referring to that long-term
storage that I mentioned, sometimes data needs to be migrated to a newer media and
associated technologies which can be a significant cost factor over time. Just a simple
cost of the migration. IBM offers policy-based data archiving solutions with built-in
media and associated technology which can be a significant cost factor over time. Just
the simple cost of migration. IBM offers policy data archiving solutions with built in
media and technology migration capabilities to help mitigate these migration cost
issues. Data can be moved from disk to tape and from tape generation to generation
while maintaining data as non-erasable non-rewritable in those environments that
require it until deletion is permitted by retention policy.
There are some other technologies that can help our customers optimize their storage
infrastructure. A new exciting technology of reducing retention costs is data
deduplication. Of course IBM required Diligent Technology last year and has recently
rolled out a set of offerings that provide deduplication for backup data, the TS7650
family of offerings. These systems use unique patented technology to reduce the
amount of storage needed by up to 25 times. They can do this by looking for duplicated
information and replacing the duplicates with a pointer to the original. For example an
example that we can all relate to is a PowerPoint presentation. I might create a
presentation and sent it to 20 different people. Each of them in turn may back up their
data to a server including this presentation. In this example the deduplication software
will identify the duplicates and reduce it to a single copy.
Another technology for reducing the amount of data to be stored is compression. This
is a straight forward mechanism that has been available for years with tape for reducing
the amount of media required to store data. There are a number of algorithms available
in the industry but they will typically reduces storage means by a factor of two to three
to one. With IBM’s 1 TB TS1130 tape drives this to result in a single tape cartridge
containing 2 to 3 TB of customer data at a street cost of less than $200 for that tape
cartridge. Of course the tape media also uses no energy or power when not being
accessed.
Now let’s turn to another important aspect of information retention and that is content
collection and archiving.
The is concerned with making sure that the information is available and managed
according to policy. First off we are finding that people are often confused about the
term archiving. For example it’s not unusual to find that people think of it as keeping
backup tapes for a long time and they consider that to be archiving. I’m going to point
out that this is definitely not the case and let me explain why. Archive consists of
primary data, it’s not a backup. We move data out of the production application
environment into an archive environment. Of course we only want to do this for data
that has value and not for all data which tends to be the case with backup (inaudible)
systems. Also archived data is long-term and nature and needs to be isolated from the
production systems.
The IBM definition is that archiving is an intelligent process for managing inactive or
infrequently accessed data that still has value while providing the ability to preserve,
search and retrieve the data during specified retention periods. There are often rules
surrounding how long the data must be archived. These rules can be advanced based,
for example data must be retained for the life of the patient and we don’t know how
long that will be at the time the data is created. Rules may be time based, for example
we must keep certain information regarding security transactions for seven years from
the day of the transaction. An archive system has to recognize these different
requirements.
On the other hand backups and restore applications are not made with these
requirements in mind. In fact we have an example of a large company that was recently
subjected to legal discovery and they have been using this backup application to retain
the data. It was ordered to obtain four years worth of information. This meant that they
not only had to obtain four years worth of tapes from the backup applications but they
also had to re-create the old application environment to read the data. Ultimately they
gave up and were fined millions of dollars. Frustratingly they knew that they had the
data but they could not produce it in a timely fashion.
Some benefits of archiving and treating archive data separately from production data or
from backup data really fall into these four categories. First improving productivity.
The archiving of data removes it from the production systems and this can actually
improve the performance of the customers production systems. We had one customer
example where they told us that their online systems response times improved 15%
simply by reducing the amount of information in their production systems. This current
system happen to be relational database systems but this will be true across SAP, Oracle
or other applications.
Archiving also can improve the backup and recovery process by reducing the amount of
production data that might be backed up on a nightly or weekly basis. Archiving can
also help reduce risk. First we remove the important information from the production
systems where it’s exposed to potential accidents, for example an accidental SQL
command that deletes a large number of rows or columns. We can also improve
operational efficiency by having the systems take advantage of the characteristics of the
data and move it to lower-cost storage automatically as the data ages. This eliminates
manual operations.
Finally of course we can reduce cost. Many customers think that putting everything on
disk is the way to go but as we have shown this can become very expensive and in
today’s economy customers are actively seeking ways to reduce cost.
Let’s turn to the next page.
IBM’s biggest advantage is that we have a comprehensive architected information
retention solutions stack. At the data content layer we have a set of applications that
can take data from a number of different production systems and different file types
including files, e-mails, records management, SAP, Siebel and PAC systems for the
healthcare industry. It can pass the data to the policy management layer. This is an
essential component of the architecture that’s required to help our customers manage the
millions of files that may exist within the enterprise. They cannot possibly manage all
these files manually in a cost effective way.
The policy management layer provides intelligent, automated movement of data over its
life cycle. Finally of course we have the storage management layer where IBM offers a
complete set of storage solutions that work with our policy and data content layers.
Other vendors might only have a single one of these alternatives but IBM cannot for
disk, secure managed storage in form of the DR550, network filers such as N Series
with SnapLock and of course a complete line of tape systems.
Let’s take a look at the next page and talk a little bit about long-term retention.
As I mentioned this is a special case but there are specific industries where this is a
current and pressing issue. For example government sector accounts, health care
accounts, insurance accounts, seismic industries are all industries were customers need
to retain information for long periods of time.
Here we have a pretty dramatic example of the challenges of really long-term retention.
On the left is a mine tablet that is made of clay. It’s 2000 years old almost and it’s still
readable today. Yet on the right side you can see storage media that was created maybe
10 or 20 years ago and whether we can read that information or not is really a problem.
The challenge with retaining information for a very long period of time includes both
the preservation of the digital bits and also understanding the logical format. For
example the dot doc file layout or the metadata that allows us to render the data back to
a form that is intelligible.
Over long periods of time it’s possible that the media used to store the data may lose its
physical properties to support the information. For example ones turn into zeros or
zeros turn into ones. This necessitates the ability to migrate the data different media
over time while maintaining its integrity.
On the other hand just getting the bit is not enough, we must render them back into the
original information. For example, did you know that the original Word .0 documents
can no longer be read by current versions of Microsoft Word? This is strictly a
metadata issue. As we look at the future this is the challenge. We need to be able to
both render bits back and be able to interpret those bits. IBM has research efforts in
both (inaudible) and Haifa that are working on solutions to these long-term retention
challenges.
Let’s talk about why customers should do business with IBM and why we should be
comfortable having conversations with your customers regarding information retention.
When you engage your clients and information retention discussion you should feel
very good because IBM has a comprehensive set of solutions backing you up. We have
archive consulting services that can help your customer understand their information
retention needs based on industry best practices and help them develop the policies and
plans to effectively manage their archival data. We also have services to assist with the
installation of both software and hardware needed for an information retention solution.
Of course we also have a wide variety of storage hardware solutions. We are not
confined to offering only a single technology like many of our competitors. They can
choose from a comprehensive hierarchical set of storage that can help them reduce cost
and provide the necessary service levels. We also can provide integrated solutions that
range from the applications to data management, to Policy Management and the storage
layer. This is the broadest suite of solutions available in the industry.
Many clients are not sure where to start their efforts. Let’s turn the page to see how we
can potentially assist.
We have identified a few questions to help you determine where the client could best
start. First regarding the storage infrastructure optimization we can ask a few of these
questions. Our goal is to understand how we can help our customers more efficiently
manage their information retention data. For example what is driving their information
growth and is it databases, e-mails or other files? Are they able to control their IT
budgets to handle the current anticipated information growth? IT budgets are often
strained by rapid growth of information and we want to understand to what extent the
client is experiencing this.
We also want to ask them about inactive or orphaned data that they may still have
residing on their tier 1 expensive storage systems. It’s possible that a lot of information
is inadvertently retained and of course this costs money in terms of the primary storage
and it costs money to back up and recover that unused data and it can also raise business
risks by keeping information that is not truly required within the enterprise that is still
subject to legal discovery.
Finally do you mainly migrate data to less expensive storage? Maybe the customer
understands that there is less expensive storage available thren the tier 1 production
systems and we want to see if an automated policy driven approach would be of
interest.
We have established what we are calling a decision tree to help you guide the process
with your customer. First off on the left you can see it is quickly trying to understand
has a customer identify their retention problems, areas and requirements. There are a
number of questions that you can ask to help fix whether that is the case or not.
Then based on their answers we direct you to several other questions. Is lack of the
highly scalable storage infrastructure an issue? Is improving storage capacity utilization
and lowering cost the issue? Is perhaps retaining all data not having a proper
information management system in place an issue? Is locating information an issue at
all? Can they find the information they truly need? Or finally is long-term retention a
major issue? Then for each of those we’ve identified some entry offerings that you
could potentially use ranging from information infrastructure optimization studies or
workshops to GTS enterprise archive consulting offerings, to customer briefings that
could be held in the Tucson briefing center in Mainz or (inaudible).
Finally you can see on the right some specific offerings that can work with the services
and the consulting to help meet your clients requirements.
What about next steps?
First we suggest that you listen to this one-hour training on information retention. That
will go into much more detail than this conference call. We have also created a white
paper addressing archiving and retention challenges that is available on SSI and you can
follow the links to quickly retrieve that information. We have also established a wiki to
help you quickly get to this information. Here is inactive link them by clicking on it, it
will take you directly to the wiki. Of course as you have the conversation with your
clients we encourage you to sign up for an in-depth briefing at one of our worldwide
executive briefing centers.
I would like to thank you for your time today and I’m looking forward to working with
you in 2009 in all of your information retention sales efforts.
Good luck and that will conclude today’s conference call.
Hello everyone my name is Alan Marin. I am the Worldwide Marketing Manager for
Enterprise Disk here at IBM based in Boulder Colorado. I’m here to talk briefly about
information infrastructure and how to sell information security.
We can advance to slide 2.
The topics that we will discuss today are listed on this slide here. It starts with the
current challenges that customers are facing with protecting in securing their
information infrastructure. There are a variety of different security capabilities and
technologies available however in this discussion we will focus on the two major focus
areas that we have in information infrastructure security. We will look at the pain
points clients are facing today in the IBM solutions to help address those pain points.
We will also look at how to best sell the IBM information security capabilities that we
will be describing including qualifying questions you can ask your clients and prospects
as well as sales resources we make it available to help you progress the sale towards a
close. Of course we’ve got some recommended actions and next steps.
We can move to slide three.
It’s clear that in today’s business environment security has become a top priority. We
have all seen the headlines and articles that outline and described how clients have lost
data and tape drives and disk drives and it’s been counting quite a stir across a variety of
private enterprises as well of government. When data is lost whether it’s on a tape
cartridge or disk drive many times it is sensitive information such as customer
information or intellectual property and to have that data lost or stolen puts the
organization at a complete disadvantage in terms of having that information show up in
the wrong hands.
Quite likely there is many of the people who are listening to this podcast that have been
notified by an organization they do business with that they lost some storage media than
they are at risk of losing your data. It’s happened to me twice. There is a direct costs as
well as an indirect costs associated with a variety of individuals whose data an
organization might have lost. It’s unfortunately becoming all too common to see
another article written about a certain client or organization that’s lost data and it’s
almost as if we are becoming immune because it happens so often. The key point is
losing data happens very often and companies are starting to spend money to protect
themselves against those security threats.
Slide 4:
What are the costs will we talk about losing or having stored media lost or stolen?
The (inaudible) Institute a couple of months ago released a survey and this is the fourth
year in a row they released this survey. What they do is look at companies and contact
organizations who have lost data or have had a similar security breach and they arrived
at a conclusion with these surveys and studies that each incident cost an average of $6.6
million per breach. If you look at the range and the range is all the way down to the
lower end of $613,000 to all the way up to $32 million for one single security breach.
So there are some serious money associated with losing personal and private data.
On average each of these breaches have recorded that each individual’s record in let’s
say my record with my bank for example or my university, each record that is lost cost
that organization about $202 per record. If you consider how many personal records
can fit in a 1 TB tape drive or 1 TB disk drive it’s easy to see how quickly a cost can
add up.
In addition to direct cost there is also a loss and the cost of losing customer confidence
and losing the goodwill that an organization has accrued over the years. You’ve got
customers that’s don’t trust and might go to competitors because they feel that you are
not adequately protecting their information. Of course you’ve got the remediation costs
associated with providing credit counseling, and credit support for all those individuals
who may have been affected by that data loss. Of course you’ve got intellectual
property and the brand equity associated with the organization that is at risk with some
of these losses.
It’s clearly becoming a fact that it’s not a luxury per se for clients to protect
information, it’s becoming obligatory. There are some legal requirements and laws in
not only the United States but in Europe and Asia that are mandating that clients protect
personal data or intellectual property to a lesser extent but clearly organizations are
being forced to protect sensitive information.
Moving to slide 5.
In this discussion we want to focus on two key aspects of information security. When
we talk about security there are a variety of technologies and solutions available for
protecting your infrastructure from threats from the outside, intrusion detection,
intrusion protection, hackers trying to penetrate the networks. You’ve also got security
that enables the ability to fight viruses that users might be accessing inadvertently when
they click on a particular website or download a particular document.
There are security services that can protect not only your applications in your networks
but certain documents. There is a variety of technology and solutions across the
enterprise that address security.
Here when we talk about information security we are talking of these two primary focus
areas and that’s controlling access to the information into the information systems in
your environment as well as protecting stored data or what we call data at rest. So were
not going to focus on those other tangential security areas but these are the two areas
that we want to discuss today.
When we talk about security to access an identity management the idea is that clients
need to control access to the systems, control access to the applications and devices
across the environment. They need to be able to manage who on the IT staff has access
to what systems and limits to what they can do when configuring the various elements
in their environment. For instance the database administrator should be given access to
the systems and applications she need to manage the organization in the database
environment but she should necessarily have access to the company’s storage system or
network switches. This is what we refer to as separation of duties and role-based
administration. The organization needs to set up policies that manage and enforce the
various members of the IT staff, what they can do and cannot do.
Another aspect of this is to record every configuration action taking on any particular IT
system which not only identifies how configuration changes might have disrupted an
application or other IT service but it also helps identify who actually made any changes
to the environment. This audit logging can help determine internal security threats so
when a <role> database administrator for example logs onto a system that he is not
authorized to access the organization will take steps to understand why.
Most IBM storage systems also offer the ability to automatically call home to alert
service personnel of impending security problems. This is often done over a secure
virtual private network connection and various systems within our portfolio such as the
DS8000 that off or enhance flexibility for customers to use their own virtual private
networks in addition to the one that IBM sets up to connect to that system remotely.
Storage area network security for example. We talk about LUN masking and SAN
zoning. SAN stands for storage area network and LUN stands for logical unit number.
For LUN masking for example the masking is the type of authorization process that
makes a LUN available to some host systems and unavailable to others. This helps
keep certain information shielded from certain users. For SAN zoning this is a method
of arranging Fiber Channel devices on a storage area network into logical groups which
helps separate data it into distinct zones which can help security.
In addition to controlling access to the various elements across the IT infrastructure the
organization needs to control end user access to applications and information and IBM
as the leader access manager in identity management. Managing which end users get
access to what applications and information has proven to be a very difficult task since
organizations are constantly adding and moving employees and existing employees
routinely change positions. Each of these personnel changes require the organization to
change the authorization policy for the employees.
For instance let’s say an employee moves from a financial role to a business
development or partner enablement role. In his financial role he had access to the
company’s day-to-day financial records, ordering systems, sales commissions etc. Now
that he is in the business development role he no longer needs access to financial
systems and in fact access to sensitive information can be quite dangerous if used in the
employee’s new role as a business development executive. He could for example
disclose financial information about future business projects with a potential partner that
might want to know what information about the organizations future business is
forecasting. This is an example of why strong identity and access management are very
important to managing an organization’s infrastructure and security policies.
Of course a sound security strategy demands we have adequate capabilities to audit our
security policies and procedures so we can comply with our own internal as well as
industry or governmental compliance regulations. It’s not enough to have security in
place, we have to be able to prove our security policies and procedures are doing what
they are intended to do to satisfy regulatory or internal compliance policies.
Slide seven.
What does IBM have in terms of controlling access to information?
Well I have already mentioned the two key categories and one of them centers around
the ability to protect ne’er-do-wells from getting access to information and getting
access to information from the data storage systems such as the disk platforms in the
tape storage platforms and of course the servers that we make available. All IBM
storage platforms offer comprehensive system-level access control to help protect the
information and people who want to use that information for noncompliance policies,
we are able to stop them through this access controls at the system level.
So what about the other aspect of information security?
This is security stored data or what we call data at rest. Here is where we bring to
market our innovative self encrypting storage. We’ve got self encrypting tape solutions
which we introduced almost 3 years ago and new self encrypting disk solutions that we
introduced in March of this year. It’s clear that data that is passing over networks in
motion is often secured through virtual private networks but what is left seen as critical
is storing data at rest.
We talked a little bit about it a few slide to go and showed when he saw all the
headlines of systems losing or organizations misplacing tape cartridges and misplacing
disk drives or even entire storage systems being stolen. It’s clear and it’s becoming
even more clear the extent associated with loosing data. This is the data at rest that
sitting in your data center environment.
Why is this needed?
What we clearly discussed that data is getting stolen and stored media is getting lost and
if you look at it it’s plainly obvious that tapes get archived both on-site and off-site.
What is less visible is that disk drives fit any enterprise disk systems are mobile. Disk
drives are leaving the enterprise every day for either a failure or <software> that’s being
recognized or the disk drive is under warranty so the organization has to remove the
drive and send it to the manufacturer to be replaced but nonetheless the data on that disk
drives often is not protected. It’s not only the individual disk drives that are being
removed but you’ve got entire disk systems that are coming off leads or need to be
refurbished in another part of the organization. How do you ensure the data on that
entire system is secure?
It’s clear that lost data breaches are not just embarrassing a tremendously costly. We
looked at that we saw the average cost of a data breach approaching $6.7 million.
What are the benefits that we are offering by encrypting data at rest?
Clearly the key benefits protecting sensitive data when the storage media is physically
removed from the secure data center. Another aspect of some of the benefits this
provides is that we are encrypting everything with zero performance. When you’re
thinking about encryption just the idea of doing data encryption assumes a very
computational, intense operation. It’s very mathematical and you got to do a lot of
calculations and processes on the data in order to encrypt it.
You got to do the reverse of all that once you decrypt the data. So with a self encryption
solution you see a tremendous performance degradation. With the self encrypting
storage that IBM is now offering we see zero performance loss which greatly helps
because you don’t have to buy additional bigger server two host or applications. You
don’t have to introduce expensive hardware accelerators to compensate for that
performance degradation. That is the clear benefits that we want to promote and that
the customers are very excited about.
The self decrypting solution also shows no disruption to the existing environment and
this is in part mainly to the fact that the key manager that every encryption solution
assumes. The key manager is a software base offering that can be run on a variety of
servers including System z servers as well as a variety of UNIX platforms and even
Windows and Linux environments. So the fact that you can run it on an existing server
in your environment and take advantage of the existing backup data recovery and
disaster recovery and high-availability environments of that server clearly means that
it’s going to be less disruptive to your existing environment. In fact it’s almost
transparent to the existing environment because in most cases you have an existing
backup environment or disaster recovery environment that the key manager or softwarebased key manager can be run on.
Another benefit of course is rather than worrying about the risk associated with losing
an individual tape cartridge or disk drive, simply by changing the encrypting capability
associated with your encrypting storage, you can potentially virtually erase all the data
on that storage system. This is very helpful when you are retiring an entire storage
system whether it’s a tape system or disk system that you don’t have to crush each
individual drive and you don’t have to be (inaudible) and destroy the drives because you
are worrying about the data falling in the wrong hands. You can simply as you get a
command change the encryption key associated with that decrypting drive and it
virtually erases all the data on that drive. So you can reuse that drive and you don’t
have to worry about harmful chemicals and materials getting thrown into our landfills.
So it not only helps protect information but it also can help the environment as well.
I mentioned earlier that an encryption solution assumes a key manager. The unified key
manager that we offer is called Tivoli Key Lifecycle Manager. We have it available to
manage both our encrypted tape solutions which have been available for almost 3 years
now and the new disk solution. The unified key manager helps to simplify the
deployment of storage encryption in your environment. Of course we’ve got integration
with the zO/S security features that truly provide enterprise class security which helps
manage the security environment not only in the storage environment across the
enterprise.
So why wouldn’t you encrypt data at rest? We are on slide 10 here I believe.
Well we’ve noticed that four main concerns arriving from the client. Of course the first
one is performance. Knowing how to mathematically computational encryption really
is, customers are concerned that introducing encryption is going to slow down their
applications. Well our response is our integrated self decrypting storage solution that
has less than 1% impact on performance. We can undermine that an address the
concern right there.
What about the potential to lose data?
It’s true that if you lose the encryption key associated with the encrypted data you’ve
lost your data forever. That is a concern. We can show our clients that are key manager
is proven with thousands of customers worldwide in some of the biggest banks across
the world.
What a complexity?
Some solutions add extra encryption appliances and that all the data must pass through
what they require data classifications or constant configuration or application changes.
That’s not true with our solution. As I mentioned our solution is virtually transparent to
an existing application environment which simplifies the deployment.
Total cost of ownership is if you’ve got double the size of your current application
server to compensate for encryption or you’ve got to introduce a new encryption
appliances or hardware accelerators, all that additional hardware costs a lot of money.
We feel and we have been able to show our clients that our encryption solution add to
small incremental costs which is very easy to manage.
As far as helping you sell information security we have created this decision tree to help
you get the conversation started with your clients. First you can see that you ask
whether the customer has analyzed their enterprise security posture and identified any
security vulnerabilities. If they haven’t then you can recommend a couple of tools that
we make available in GTS and across lab-based services to help the client identify some
vulnerabilities they might have across their environment.
If they do understand their security posture and they know their security vulnerabilities,
ask yourself these three questions in the center of this chart. Is controlling access to
applications and information an issue? If so you want to forward your lead to the Tivoli
Security Management Team. However if there is an issue with securing data on storage
media when they are physically removed from the system we’ve got a couple of white
papers and some information that can help address the vulnerability with your client but
you’ve got to learn a little bit about them yourself. We have provided some information
to help you learn as well as educate your client on how IBM can help address that
particular security vulnerability.
Lastly is there an issue with security or cost effectively sanitizing or virtually erasing
the data from their storage systems when they are retired? If so you need to explain to
the client how our self encrypt in solution allows the client to simply change the
encryption key associated with the encrypted data and be able to completely and
securely wipe those information systems that are being retired and wipe them clean in a
cost effective and simple manner. They don’t have to crush the drive and they don’t
have to throw the drive in the landfill. They can white and clean and ensure that the
data is not being compromised.
At the top of this slide to see the qualifying questions that we have included to help you
get that dialogue started with your clients.
We also make available the IBM Information Infrastructure Sales Kit it which has a
variety of documents. We’ve got the quick reference guides which have an overview
and some core information that can help you understand and help your clients
understand what IBM can do for them in terms of securing their information
infrastructure. We’ve got some flash demos and we’ve got some analyst white papers
as well as some brochures to help arm you when you talk with your client about how we
can help them address their information security challenges.
We are working on some Information Infrastructure Assessment Tools for the four main
information infrastructure areas and you can see that circled in red, Information
Security. This helps the business partner understand how to approach the client that
might or might not have a security vulnerability. We give you the types of questions
you can answer and we can suggest certain deliverables and documents that you can
forward to your clients to help them educate on how it is that we can satisfy some of
their security vulnerabilities.
Next steps. I mentioned earlier that you to educate yourself on the IBM Information
Infrastructure. We make a variety of sales kits available on SSI and Partner World to
help educate you as well as your client. It’s important to keep in mind that the tools
focal points that we discussed today are access control and storage encryption. Keep in
mind that those are only two aspects of a wider and broader enterprise security strategy.
To some extent you need to understand a little bit about the other types of security
solutions available but when your client is talking about information security, access
controlled information and storage encryption are the two that you need to worry about
or be most concerned with.
Of course you need to begin conversation with your clients and understand what it is
they are concerned about when it comes to security. Are they looking for access control
or securing storage data and what about the recommended self-assessment tools and
workshops that you can encourage them to take to understand more about how an
effective security policies can help their business. Of course we make available the
Tivoli Security Team and they’ve had specialists over there that can help support your
sales goals. You can’t expect sellers and business partners to understand all the
nuances, all the encryption algorithms and encryption standards that are available today.
There’s a lot of detailed information and so when you get to that stage of the storage
sale then you need to contact the Tivoli Security Specialists and pull them in. They are
getting compensated for the sale of Tivoli Key Lifecycle Managers so they’ve got the
encouragement to help you close the deal. Gordon Arnold over at Tivoli can help put
you in contact with the right people.
That brings us to the end of the presentation. I appreciate you giving us the time to take
you through the IBM information infrastructure security capabilities that we make
available. Again there is a lot of information that we make available for end users as
well as for sellers to enable themselves to help sell our Information Security Portfolio.
Again my name is Alan Morin. If you have any questions you can feel free to send me
an e-mail. I think I left my e-mail address on the front cover page. We look forward to
working with you. Be sure that your client understands that IBM is in fact a security
vendor. We build security in everything we do. That is important to relate that to your
clients.
Thank you very much.
Download