The PRWIRE Press Releases https:// 2015-07-22T07:27:18Z RSA Via Lifecycle and Governance Identity Solution Enhances Cyber Defense While Improving Compliance, Business Efficiency and Performance 2015-07-22T07:27:18Z rsa-via-lifecycle-and-governance-identity-solution-enhances-cyber-defense-while-improving-compliance-business-efficiency-and-performance STORY HIGHLIGHTS RSA® Via Lifecycle and Governance is designed to contribute critical new and enhanced capabilities to aid detection of advanced attacks, automatically alerting users to unauthorised access changes, including privilege escalations frequently performed by malicious actors who have compromised user identities Integration with RSA Archer® Governance, Risk, and Compliance is engineered to improve visibility for incident handlers through sharing of identity context, and connects access governance and lifecycle processes to the enterprise risk model Helps accelerate business processes for onboarding new users, and streamlining user interface configuration tasks Scalability, reliability and performance enhancements helps ensure IT can effectively govern and administer thousands of applications in an organisation RSA CONFERENCE ASIA PACIFIC & JAPAN, SINGAPORE, JULY 22, 2015 RSA, The Security Division of EMC (NYSE:EMC), today announced the newest version of RSA Via® Lifecycle and Governance, and the completion of the RSA Via family of Smart Identity solutions. Improved lifecycle management and governance are critical capabilities for managing identities in today’s environments where cloud and mobility have dramatically transformed business processes and requirements and advanced threat actors increasingly target and exploit identities as a primary attack vector. RSA Via Lifecycle and Governance (formerly known as Identity Management and Governance, and Aveksa), helps organisations efficiently and reliably deliver users the right access to the right resources from the endpoint to the network to the cloud, without sacrificing security, compliance, or agility. With new automated detection capabilities enforcing access policies and processes, RSA Via Lifecycle and Governance now is designed to improve security through enhanced visibility into authorised and unauthorised changes across the network. This offers enterprises the ability to quickly detect malicious privilege escalation, reverse it, and break a key link in the cyber-attack chain of advanced threats. Secure Identity Management Identities and credentials are a primary target for hackers and criminals. With the latest enhancements to RSA Via Lifecycle and Governance, Identity and Access Management (IAM) teams can further contribute to organisational cybersecurity initiatives while helping to ensure their businesses’ identity needs are efficiently and effectively met. By actively validating all user access changes against policy and processes, the RSA solution is engineered to quickly detect unauthorised user access changes - including privilege escalation performed by malicious actors. This capability also detects “out of band” access grants by end users who bypass IT processes, reducing security risk and ensuring consistent enforcement. RSA Via Lifecycle and Governance helps Security Operations Center (SOC) teams better analyse and triage incidents by providing essential identity context. Enhancing user IDs with detailed views of a user, their job role, and any inappropriate access rights, SOC teams now can more quickly and effectively analyse and remediate security incidents. Robust, Scalable, and Reliable Identity Management Organisations demand that their IAM platforms be scalable and reliable to support a 24x7, global business environment. RSA Via Lifecycle and Governance is engineered to provide enhanced enterprise-class scalability and high availability through significant performance improvements, enabling IT to effectively govern and administer 100s, and even 1,000s of applications in an organisation. Enhancements to RSA Via Lifecycle and Governance also help allow organisations to collect and process identity data on a more frequent basis, providing better and faster visibility into any user access changes. Additionally, RSA has improved system resiliency to erroneous or corrupted application data. Business Agility Information Security teams often struggle to balance the demands of the business – which typically wants broader and faster access – with the need to maintain a strong security and compliance stance. With the new capabilities of RSA Via Lifecycle and Governance, organisations can quickly respond to business needs, without sacrificing security and compliance. IAM teams are now able to more rapidly on-board applications through a wizard-based UI, and leverage improved ease-of-use for workflow, form, and application on-boarding configuration. These capabilities build upon RSA’s philosophy of “configuration, not customisation,” enabling IAM teams to more rapidly respond to business needs. An Integrated Solution – One RSA RSA Via Lifecycle and Governance completes the new RSA Via portfolio of smart identity solutions, including, RSA Via Access, and RSA SecurID® and complemented by other RSA solutions such as RSA® Adaptive Authentication. With RSA Via, organisations have a comprehensive solution for managing all of their identity needs from the endpoint to the cloud. Outside of the RSA Via portfolio, RSA Via Lifecycle and Governance integrates with RSA Archer® GRC to enable a consistent and actionable risk model for organisations. Application risk can be shared between RSA Archer GRC and RSA Via Lifecycle and Governance, helping to ensure that core IAM business processes – such as access review frequency and access request approval workflows – reflect risk levels appropriately. RSA Via Lifecycle and Governance can also be used to help prove enforcement of relevant policies and control procedures, reducing risk and meeting compliance requirements defined within RSA Archer GRC. The newest release of RSA Via Lifecycle and Governance will be available in Q3 2015. Executive Quote: Jim Ducharme, Vice President of Engineering and Product Management, RSA “Legacy IAM systems aren’t capable of addressing the constantly evolving requirements of today’s mobile and cloud-based environments. Organisations need to approach identity, security and compliance from a holistic perspective, and adopt solutions that are as agile as and scale to meet the needs of their dynamic enterprise IT environments. With the introduction of RSA Via Lifecycle and Governance, we’ve completed the RSA Via portfolio of smart identity management solutions and given organisations an end-to-end identity solution. RSA Via is built for a world where mobility, cloud computing and advanced threats are all an integral part of the identity management and authentication challenge. We’ve connected the dots between those key pain points in a way no one else can - with an analytics- and risk-based approach to identifying roles, managing identities and locking down one of today’s most common tactics in advanced threats— user compromise and privilege escalation. The enhancements to RSA Via Lifecycle and Governance helps meet the needs of today’s evolving IT landscape, making managing access easier, improving visibility and effectiveness, while also improving governance, efficiency and security for enterprises.” Analyst Quote Jon Oltsik, Principal Analyst, Enterprise Strategy Group “Information Security professionals often struggle to maintain a secure IT environment while delivering efficient and reliable access to business systems and resources. Employees want access to business applications from every device, but IT needs to take the appropriate steps to balance user convenience with security and compliance. Leading enterprises are adopting identity management systems that facilitate business agility AND strong security so they can rapidly detect and respond to issues such as malicious privilege escalation.” ADDITIONAL RESOURCES: Watch Jim Ducharme speak more about the new features of RSA Via Lifecycle and Governance in this video Connect with RSA via Twitter, Facebook, YouTube, LinkedIn and the RSA Speaking of Security Blog and Podcast For further information please contact - Clare Cassidy, Account Manager Spectrum Communications 02 9469 5700 emc@spectrumcomms.com.au About RSA RSA’s Intelligence Driven Security solutions help organizations reduce the risks of operating in a digital world. Through visibility, analysis, and action, RSA solutions give customers the ability to detect, investigate and respond to advanced threats; confirm and manage identities; and ultimately, help prevent IP theft, fraud and cybercrime. For more information on RSA, please visit www.rsa.com. New RSA ECAT Release Engineered to Extend Ability to Rapidly Detect and Block Advanced Threats on Endpoints 2015-07-22T07:17:32Z new-rsa-ecat-release-engineered-to-extend-ability-to-rapidly-detect-and-block-advanced-threats-on-endpoints STORY HIGHLIGHTS RSA® ECAT is designed to enable active endpoint defense against advanced threats by rapidly detecting and blocking or quarantining suspicious files and processes without the need for signatures Now is engineered to enable real-time visibility, detection, and response on endpoints even while outside the corporate network Newly introduced intelligent risk scoring system is built to enable analysts to respond and take action based on highest priority incidents New capabilities, when combined with RSA Security Analytics, are designed to enable SOC teams to detect and respond to advanced attacks more quickly and precisely by delivering complete visibility across the entire enterprise - from the endpoint to cloud. RSA CONFERENCE ASIA PACIFIC & JAPAN, SINGAPORE, JULY 22, 2015 RSA, The Security Division of EMC (NYSE:EMC), today announced, the latest version of RSA® ECAT for advanced endpoint threat and malware protection. RSA ECAT is designed to enable analysts to quickly hunt down and block new malware missed by existing tools by focusing on analysing the behavior of every process on the endpoint for suspicious indicators rather than relying on traditional malware signatures. The new version of RSA ECAT also helps allow analysts to block suspicious endpoint activity across the enterprise whether the endpoints are on or off the corporate network – reducing the opportunity for an attacker to take advantage of off-network activity. Analyst response to suspicious activity is also better prioritised by a newly introduced intelligent risk scoring algorithm that is engineered to leverage advanced machine-learning techniques to enable faster detection and categorisation of a wider range of malicious endpoint behavior. Cybercriminals are constantly developing new malware and techniques to circumvent security and penetrate an organisation’s network. The new enhancements to RSA ECAT are designed not only to automatically detect these previously unknown threats, but also will block or quarantine them, limiting the ability of an attacker to avoid detection and increase their dwell time in the network. This goes well beyond discovery of zero-day attacks or targeted attack variants by harnessing the power of memory analysis, which compares what happens in memory to what happens on disk, to spot code injection, hooking and other advanced techniques. Cybercriminals are also taking advantage of the fact that endpoints are increasingly leveraging the public Internet and disconnected from the corporate network. To address this growing reality, RSA ECAT now is engineered to give enterprises the option for security analysts to monitor and take action on endpoints anywhere, anytime they are connected to the Internet. Organisations are under constant attack, creating the potential for chaos and breach as analysts struggle to track down and respond to every alert, potentially missing the alert that signals the greatest threat. To address the torrent of alerts that endpoints can generate for analysts, RSA ECAT’s new intelligent risk scoring system helps allow organisations to quickly understand, prioritise, and focus on the most important incidents before they impact the enterprise. RSA provides comprehensive visibility from the endpoint to the cloud. By combining a thorough view of behavior on the endpoint from RSA ECAT with the rich set of data from network packets and logs in RSA® Security Analytics, analysts have the ability to see and understand everything happening in their environment and within seconds can investigate incidents down to the most granular detail and take the most appropriate action. The next version of RSA ECAT will be available in Q3 2015. Executive Quote: Grant Geyer, Senior Vice President, Products, RSA “Cyber criminals are becoming more creative when it comes to developing new techniques to penetrate an organisation’s network. If a network is infected by an unknown malware, relying on signature-based tools like Anti-Virus solutions will leave you with a false sense of security. When a network is at risk, analysts must be able to detect the issue quickly, and rapidly understand the type of attack along with the affected systems to understand the extent of malicious activity at the endpoints. RSA ECAT complements our network and cloud approaches to provide pervasive visibility for faster threat detection and remediation.” Analyst Quote: Christina Richmond, Program Director, Security Services, IDC “Senior security analysts often spend much of their day responding to incidents that turn out to be less critical than they originally appeared. This is the norm because they are limited in their ability to determine the sophistication and scope of an attack because of a lack of visibility into the behavior on their endpoints. Endpoint detection and response tools, like RSA ECAT, can help address this challenge by better enabling less experienced team members to prioritise suspicious activity and quickly triage alerts – enabling the entire staff to focus on the most important alerts and reducing the case load on the most experienced analysts.” ADDITIONAL RESOURCES: Learn more about the new features in RSA ECAT in this video Check out the Rule your Endpoints eBook Connect with RSA via Twitter, Facebook, YouTube, LinkedIn and the RSA Speaking of Security Blog and Podcast For further information please contact - Clare Cassidy, Account Manager Spectrum Communications 02 9469 5700 emc@spectrumcomms.com.au About RSA RSA’s Intelligence Driven Security solutions help organizations reduce the risks of operating in a digital world. Through visibility, analysis, and action, RSA solutions give customers the ability to detect, investigate and respond to advanced threats; confirm and manage identities; and ultimately, help prevent IP theft, fraud and cybercrime. For more information on RSA, please visit www.rsa.com. EMC Redefines Simplicity With VSPEX BLUE Hyper-Converged Infrastructure Appliance 2015-02-04T00:29:36Z emc-redefines-simplicity-with-vspex-blue-hyper-converged-infrastructure-appliance-1 HOPKINTON, MA —February 3, 2015 News Summary: Delivers compute, storage, networking and management in an agile, scalable, trusted and easy to manage hyper-converged infrastructure appliance Radically simplifies IT Infrastructure deployment and management Defines new levels of ease-of-use with power on to Virtual Machine (VM) provisioning in 15 minutes   Embedded integrated management experience, downloadable software titles and secure remote support Ideal for infrastructure consolidations, virtual desktops in large remote or branch offices and managed service providers Available exclusively through ecosystem of industry-leading distributor(s) partners including Arrow, Avnet, Networld, TD Azlan and Tech Data   Interact with EMC Online: Follow @EMCCorp, @EMCVSPEX @EMCPartners View additional related news from EMC via EMC Pulse Blog For more information on VSPEX BLUE, go to http://www.emc.com/vspex Connect with EMC via Twitter, Facebook, YouTube, and LinkedIn Full Story:EMC Corporation (NYSE:EMC) today announced availability of the EMC® VSPEX® BLUE hyper-converged infrastructure appliance that delivers compute, storage, networking and management powered by VMware EVO:RAIL and EMC software. The VSPEX BLUE hyper- converged infrastructure appliance enables customers to go from power on to provisioning virtual machines in under 15 minutes, offering impressive time to value when compared to other hyper-converged infrastructure offerings. The VSPEX BLUE scale-out infrastructure provides customers the ability to meet users’ changing demands at the speed of business and freedom from the burden of advanced IT forecasting. Well suited for mid-market customers, VSPEX BLUE comprises common modular building blocks offering customers seamless linear scalability from one to four 2U/4-nodes. VSPEX BLUE is ideal for infrastructure consolidations, virtual desktops in large remote or branch offices and managed service providers. The VSPEX BLUE hyper-converged infrastructure appliance simplifies IT configuration, management, and maintenance. EMC is delivering an integrated management experience for VSPEX BLUE customers.  The VSPEX BLUE Manager extends the capabilities of the native EVO:RAIL Deployment, Configuration and Management (DCM) Engine, delivering a built-in support experience and Market providing customers access to select software titles and solutions from an EMC interface that leverages VMware EVO:RAIL’s clean and intuitive design principles.VSPEX BLUE Manager With the VSPEX BLUE hyper-converged infrastructure appliance, EMC continues to break new ground, offering for the first time a one-stop Market to download value-added software, from EMC and EMC ecosystem partners to quickly and easily meet ever-changing business demands.   The EMC VSPEX BLUE Manager provides a seamless and harmonious end user experience that embodies the simplicity and ease-of-use functionality VMware EVO:RAIL customers expect. From the VSPEX BLUE Manager, users can conveniently access electronic services, such as EMC knowledge base articles, access a wealth of community sourced online and real time information and familiarize themselves with EMC best practices for optimal appliance operations. The VSPEX BLUE Manager also simplifies IT management by delivering patch and software update notification that can be installed automatically without interruption or downtime so that the appliance software is always up-to-date.  VSPEX BLUE Market Within the VSPEX BLUE Manager EMC has added VSPEX BLUE Market store. The Market provides customer access to trusted solutions and technologies that are developed by EMC and technology partners that are pre-validated for the VSPEX BLUE appliance and then made available to download. In the first release of the Market, EMC has included download access to business continuity with EMC RecoverPoint® for Virtual Machines, VMware vSphere® Data Protection™ Advanced providing disk based de-duplicated backup and recovery that is optimized for virtual environments, and access to virtually unlimited hybrid cloud storage via the EMC CloudArray® Gateway.   EMC Secure Remote Support (ESRS) The EMC VSPEX BLUE hyper-converged infrastructure appliance also provides EMC Secure Remote Support (ESRS) that is built into the interface and provides end-to-end, consistent support via chat, community or phone with a single point of accountability for all hardware and software. With ESRS, EMC can periodically monitor the EMC VSPEX BLUE appliance and will be notified of failure enabling support to take preventative measures to help avoid downtime. When coupled with ESRS, EMC 24x7 Support is incredibly simple. All appliance issues regardless of whether they are hardware or software are handled by EMC.  Partner Ecosystem EMC will focus initially on a select group of world-class EMC Business Partner Program distributors for the EMC VSPEX BLUE appliance including Arrow, Avnet, Networld, TD Azlan and Tech Data. Initial distribution partners have an established global reach, required manufacturing capabilities, and the necessary international certifications and capabilities.  Availability EMC expands its converged infrastructure portfolio by affording increased customer choice with VSPEX BLUE. With fast, simple deployment, comprehensive support and the agility to scale, VSPEX BLUE joins VCE Vblock Systems and VSPEX Reference Architectures as part of EMC’s comprehensive and trusted lineup of converged offerings. The EMC VSPEX hyper-converged infrastructure appliance is generally available February 17. Customers should contact their authorized EMC partner to learn more about VSPEX BLUE.Market Industry Analyst Quote Mark Bowker, Senior Analyst, ESG   “ESG research validates that early adopters of converged infrastructure are achieving benefits associated with improved service and support, ease of management, and an improved total cost of ownership. The VSPEX BLUE appliance will help enterprise IT accelerate the strategic imperative of virtualization/migration to a hybrid cloud. The appliance is a simple, low-risk path to delivering virtualization, and snaps well into an existing line of EMC solutions. It helps reduce TCO, and ensures availability and flexibility so that enterprise IT can achieve infrastructure excellence and connectivity to the cloud.”  Reseller Quotes: Tim Frank, Executive Vice President, Sales, Ahead   “We see the EMC VSPEX BLUE appliance as providing the simplicity and agility that our customers are looking for in a hyper-converged infrastructure appliance. The automated install, presided virtual machines and simple user interface is what customers are asking for. The VSPEX BLUE appliance provides Ahead with the ability to provide our customers one appliance to facilitate the many mixed workloads that are required by IT today.”  Tom Cahill, Vice President Product and Partner Management, CDW “The built-in differentiation in VSPEX BLUE separates EMC from a busy market segment. VSPEX BLUE will provide our customers greater ease of management, ease-of-use and access to a robust portfolio of additional EMC applications that will help make the day-to-day running of IT simpler. This product will give customers the agility they need enabling them to add IT when it suits their business.”  EMC Executive Quotes: Gregg Ambulos, Senior Vice President, Global Sales, EMC Corporation   “EMC’s Business Partner Program is an ecosystem comprised of highly skilled and technical partners. Our distribution partners are uniquely qualified to help us address and meet the demands of the rapidly growing converged infrastructure space.  We are excited bringing the EMC VSPEX BLUE appliance to market solely through this channel, where we can leverage our distributors’ global reach and scale to take this highly differentiated product to market.  This new approach will provide better growth opportunities for our partners, while continuing to provide innovative, industry-leading solutions to our customers.”  Gil Shneorson, Vice President, General Manager VSPEX, EMC Corporation   “The VSPEX BLUE appliance represents a strategic addition to EMC’s existing highly successful converged infrastructure portfolio. EMC’s VSPEX BLUE appliance is delivered exclusively by our partners, and offers customers IT simplicity and agility backed by EMC’s award-winning global support organization, with built-in differentiation such as the VSPEX BLUE Manager, Market and EMC Secure Remote Support that will dramatically simplify how IT is deployed and managed.”  Strategic Technology Partner Quotes: Shannon Poulin, Vice President and General Manager, Data Center Group – Intel “A product like EMC's VSPEX BLUE appliance helps address many of the challenges that Enterprise IT is facing by combining storage, with compute and network resources into a single hyper-converged infrastructure appliance, it delivers a solution that minimizes the latency and also makes it easier to install quickly and scale performance to address real-time workloads.”  Mornay Van Der Walt, Vice President, EVO:RAIL Group, VMware “Today we are excited with EMC's announcement of VSPEX BLUE, a radically simplified hyper-converged infrastructure appliance powered by EMC solutions and VMware EVO:RAIL. This hyper-converged offering is a fully integrated and automated virtual infrastructure building block, which can accelerate customer’s time to value for IT investments, and offers a fast and low risk path to the software-defined data center.”Additional Resources For more information on VSPEX, go to http://www.emc.com/vspex To learn more about EMC Converged Infrastructure Solutions, follow @EMCCloud Read the IDC White Paper, "EMC Launches VSPEX BLUE for VMware EVO:RAIL Hyperconverged Systems with Unique Feature Set Enabling IT Transformation," document number 253751. Join the #EMC conversation on Twitter Connect with EMC via Twitter @EMC Facebook, YouTube, LinkedIn and ECN About EMC EMC Corporation is a global leader in enabling businesses and service providers to transform their operations and deliver IT as a service. Fundamental to this transformation is cloud computing. Through innovative products and services, EMC accelerates the journey to cloud computing, helping IT departments to store, manage, protect and analyze their most valuable asset — information — in a more agile, trusted and cost-efficient way. Additional information about EMC can be found at www.EMC.com. ###   EMC, CloudArray, EMC RecoverPoint, and VSPEX are trademarks or registered trademark of EMC Corporation in the United States and other countries. Other products and/or services are trademarks of their respective owners.VMware and EVO:RAIL are registered trademarks of VMware, Inc. in the United States and other jurisdictions. Other marks and names mentioned herein may be trademarks of their respective organizations. The use of the word "partner" or "partnership" does not imply a legal partnership relationship between VMware and any other company.EMC Forward-looking Statement This release contains "forward-looking statements" as defined under the Federal Securities Laws. Actual results could differ materially from those projected in the forward-looking statements as a result of certain risk factors, including but not limited to: (i) adverse changes in general economic or market conditions; (ii) delays or reductions in information technology spending; (iii) the relative and varying rates of product price and component cost declines and the volume and mixture of product and services revenues; (iv) competitive factors, including but not limited to pricing pressures and new product introductions; (v) component and product quality and availability; (vi) fluctuations in VMware, Inc.'s operating results and risks associated with trading of VMware stock; (vii) the transition to new products, the uncertainty of customer acceptance of new product offerings and rapid technological and market change; (viii) risks associated with managing the growth of our business, including risks associated with acquisitions and investments and the challenges and costs of integration, restructuring and achieving anticipated synergies; (ix) the ability to attract and retain highly qualified employees; (x) insufficient, excess or obsolete inventory; (xi) fluctuating currency exchange rates; (xii) threats and other disruptions to our secure data centers or networks; (xiii) our ability to protect our proprietary technology; (xiv) war or acts of terrorism; and (xv) other one-time events and other important factors disclosed previously and from time to time in EMC's filings with the U.S. Securities and Exchange Commission. EMC disclaims any obligation to update any such forward-looking statements after the date of this release.  DIGITAL UNIVERSE INVADED BY SENSORS 2014-04-10T00:22:00Z digital-universe-invaded-by-sensors ​DIGITAL UNIVERSE INVADED BY SENSORS 7th Annual Study Reveals that Digital Universe to Grow 10x by 2020; Data Generated by Sensor-Enabled “Things” to Represent 10% HOPKINTON, MASS., - APRIL 9, 2014 - EMC Corporation (NYSE:EMC) today announced results of the seventh EMC Digital Universe study, the only study to quantify and forecast the amount of data produced annually. This year’s study titled “The Digital Universe of Opportunities: Rich Data and the Increasing Value of the Internet of Things,” with research and analysis by IDC, reveals how the emergence of wireless technologies, smart products and software-defined businesses are playing a central role in catapulting the volume of the world’s data. Due, in part, to this Internet of Things, the digital universe is doubling in size every two years and will multiply 10-fold between 2013 and 2020 – from 4.4 trillion gigabytes to 44 trillion gigabytes. For perspective: The amount of information in the digital universe would fill a stack* of iPad Air tablets reaching 2/3 of the way to the moon (157,674 miles/253,704 kilometers). By 2020, there will be 6.6 stacks. Today, the average household creates enough data to fill 65 iPhones (32gb) per year. In 2020, this will grow to 318 iPhones.  Today, if a byte of data were a gallon of water, in only 10 seconds there would be enough data to fill an average house. In 2020, it will only take 2 seconds. The Internet of Things comprises billions of everyday objects that are equipped with unique identifiers and the ability to automatically record, report and receive data – a sensor in your shoe tracking how fast you run or a bridge tracking traffic patterns. According to IDC the number of devices or things that can be connected to the Internet is approaching 200 billion today, with 7% (or 14 billion) already connected to and communicating over the Internet. The data from these connected devices represents 2% of the world’s data today. IDC now forecasts that, by 2020, the number of connected devices will grow to 32 billion – representing 10% of the world’s data. The Internet of Things will also influence the massive amounts of “useful data” – data that could be analysed – in the digital universe. In 2013, only 22% of the information in the digital universe was considered useful data, but less than 5% of the useful data was actually analysed – leaving a massive amount of data lost as dark matter in the digital universe. By 2020, more than 35% of all data could be considered useful data, thanks to the growth of data from the Internet of Things, but it will be up to businesses to put this data to use. This phenomenon will present radical new ways of interacting with customers, streamlining business cycles, and reducing operational costs, stimulating trillions of dollars in opportunity for businesses. Conversely, it presents significant challenges as businesses look manage, store and protect the sheer volume and diversity of this data. For example, IDC estimates that 40% of the data in the digital universe require some level of protection, from heightened privacy measures to fully-encrypted data. That said, only half of that data – just 20% – is actually protected. Other Key Findings: Emerging markets are producing more data: Currently, 60% of data in the digital universe is attributed to mature markets such as Germany, Japan, and the United States, but by 2020, the percentage will flip, and emerging markets including Brazil, China, India, Mexico and Russia will account for the majority of data. Data is outpacing storage: The world’s amount of available storage capacity (i.e., unused bytes) across all media types is growing slower than the digital universe. In 2013, the available storage capacity could hold just 33% of the digital universe. By 2020, it will be able to store less than 15%. Fortunately, most of the world’s data is transient (e.g. Netflix or Hulu stream, Xbox ONE game interactions, Digital TV.) and requires no storage. Data touched by the cloud will double: In 2013, less than 20% of the data in the digital universe was “touched” by the cloud. By 2020, that percentage will double to 40%. Consumers create data but enterprises are responsible for it: Two-thirds of the digital universe bits are created or captured by consumers and workers, yet enterprises have liability or responsibility for 85% of the digital universe. EMC QUOTE Jeremy Burton, President of Products and Marketing, EMC Information Infrastructure “As more and more businesses capitalise on the social and mobile phenomenon, the enormity and potential of the digital universe grows, and businesses are presented with greater opportunities to analyse new streams of data and gain more value from the data they already have. Simply put – companies of all types are shape shifting into software-defined enterprises right before our eyes. While the potential is massive, the implications are equally daunting. IT departments must press the restart button to find new ways to innovate around existing infrastructure while positioning themselves to dive into a future of third platform computing.“ IDC QUOTE Vernon Turner, Senior Vice President, IDC “The Digital Universe and The Internet of Things go hand in hand. As sensors become connected to the Internet, the data that they generate becomes increasingly important to every aspect of business, transforming old industries into new relevant entities. Traditional storage services will be elevated to new levels of resiliency and tolerance to support the Digital Universe, which can only be guaranteed in a software-defined environment.” ABOUT EMC EMC Corporation is a global leader in enabling businesses and service providers to transform their operations and deliver IT as a service. Fundamental to this transformation is cloud computing. Through innovative products and services, EMC accelerates the journey to cloud computing, helping IT departments to store, manage, protect and analyse their most valuable asset – information – in a more agile, trusted and cost-efficient way. Additional information about EMC can be found at  www.EMC.com . *Calculated using iPad Air = .29” tick, 128 gigabyte capacity. ### EMC is a registered trademark of EMC Corporation. Other trademarks are the property of their respective owners. Pivotal Changes the Economics of Big Data Forever with New “Pivotal Big Data Suite” Offering 2014-04-02T23:09:00Z pivotal-changes-the-economics-of-big-data-forever-with-new-pivotal-big-data-suite-offering Pivotal Changes the Economics of Big Data Forever with New “Pivotal Big Data Suite” Offering Industry’s First Big Data "Mega Bundle" Gives Customers Easy and Flexible Access to Pivotal’s Hadoop Data Platform, MPP Relational Database and In-Memory Transaction Database with a Single Subscription Price Summary Pivotal today announced the availability of the Pivotal Big Data Suite, an annual subscription based software, support, and maintenance package that bundles Pivotal Greenplum Database, Pivotal GemFire, Pivotal SQLFire, Pivotal GemFire XD , Pivotal HAWQ, and Pivotal HD into a flexible pool of big and fast data products for customers. The Pivotal Big Data Suite includes an enterprise-class, advanced set of technologies that fully support Apache Hadoop and HDFS. With a cumulative contract minimum, Pivotal will make Pivotal HD, the world’s most advanced distribution of Apache Hadoop, available on an unlimited basis at no extra cost, including support. This gives customers a unique opportunity to use any combination of Pivotal HD and Pivotal’s world-class big and fast data products in one offering. Unlike multi-vendor, patchwork heterogeneous solutions, the Pivotal Big Data Suite delivers a unified set of capabilities grounded in over three decades of expertise, development, and market leading data management and analytical intelligence. It allows companies to use the technologies that are right for their business, without fear of penalty or waste of investment. Pivotal Big Data Suite is available today. Priced aggressively, the subscription is based on the number of cores on two and three year terms and requires a cumulative contract minimum. SAN FRANCISCO, April 2, 2014 – Pivotal today announced the availability of the Pivotal™ Big Data Suite, an annual subscription based software, support, and maintenance package that bundles Pivotal Greenplum Database, Pivotal GemFire, Pivotal SQLFire, Pivotal GemFire XD, Pivotal HAWQ, and Pivotal HD into a flexible pool of big and fast data products for customers. Pivotal Big Data Suite is available today and is available through an aggressively priced subscription model based on the number of cores on two and three year terms. The merging of traditional and next-generation data infrastructure technologies is defined as a “Business Data Lake” - a business priority for CIOs in 2014 and beyond and something that can be uniquely delivered by a company like Pivotal with broad data and analytics expertise. The Pivotal Big Data Suite fills a much-needed gap in the market, helping enterprise companies to capitalize on explosive data growth by offering a multi-faceted data portfolio with a “use it as you need it” pricing model. This enables organizations to flexibly move their investment from one technology to another within the suite, at any time. Per core pricing ensures that data that is simply being stored is not taxed, which will be important as enterprises seek to consolidate more and more information into a Business Data Lake. With the Pivotal Big Data Suite, data driven companies now have the ability to store everything, analyze anything and build the right thing without fear or penalty when making data technology investment decisions. Unlimited, Fully Supported Apache Hadoop In the face of today’s corporate mandate to manage, store and analyze big data, Hadoop has emerged as a leading tool used increasingly by enterprises around the world as the core of their data management solution. With the rapid proliferation of Hadoop-based data storage requirements, traditional software consumption models are significant, cost-prohibitive obstacles to enterprise success in big data. Only Pivotal offers an unlimited subscription to Pivotal HD, today’s leading enterprise Hadoop distribution. With the Pivotal Big Data Suite, unlimited Pivotal HD empowers enterprises to stretch their Business Data Lakes to store everything and analyze anything, without fear of runaway license and support costs. The Pivotal Big Data Suite ties all of the company’s leading data technologies together, enabling customers to leverage any one, whenever and wherever they need it. Existing Pivotal Greenplum Database customers can continue to leverage the powerful analytical data capabilities they love, while, at the same time, allow them to extend the use of the Pivotal data portfolio: everything from real time in-memory capabilities via Pivotal GemFire®, Pivotal SQLFire to Pivotal GemFire XD to lightning-fast queries via Pivotal HAWQ™ over Pivotal HD. Unified, simplified, and flexible licensing gives organizations the agility to use the technology that is right for their business. Enabling the Data Driven Enterprise and Leveraging Cloud Computing Data sits at the center of any business, the lens through which modern disruptors unearth answers to their most important business questions and the basis for the creation of a new class of applications that better serve the needs of customers. In addition to the Pivotal Big Data Suite, Pivotal leverages Pivotal One , the world’s first comprehensive multi-cloud enterprise platform-as-a-service, and their agile development unit, Pivotal Labs, to deliver the most robust and compelling offering for customers to transform their business and find value in today’s era of the cloud. Supporting Quotes Shawn Rogers Vice President Research at Enterprise Management Associates “The Pivotal Big Data Suite meets the needs of companies demanding flexibility and innovation concurrently. The suite delivers an array of functionality combined with a subscription-based model that allows customers to leverage the technology they need without traditional licensing constraints. By providing unlimited and supported Pivotal HD, Pivotal has found a way to encourage data growth and reduce risk for its customers enabling them to thrive and innovate.” Paul Maritz, CEO, Pivotal “Enterprise customers are ready to move onto the next generation of data computing that gives them the speed, scale and efficiency they need to stay relevant in the market. They should be able to take advantage of modern database technologies and use them collectively without fear of penalty or waste of investment. With the Pivotal Big Data Suite, we are taking the lead for the industry by removing the technical barriers to data off the plates of our customers. Now the choice isn’t about Hadoop or a SQL database, in-memory or real-time processing, but efficiency and value.” Availability Pivotal Big Data Suite is available now. For pricing please visit http://www.gopivotal.com/contact. Resources Pivotal Big Data Suite Value Tool http://bit.ly/1lmntp9 Read the blog “The Big Data Bombshell: Pivotal’s New Big Data Suite Gives Unlimited Hadoop to Enterprises” http://blog.gopivotal.com/?p=6382 The Pivotal Big Data Suite Datasheet http://bit.ly/1lAFKS9 Pivotal Big Data Suite http://bit.ly/1lAFQcH Learn more about the Business Data Lake at http://www.gopivotal.com/big-data/businessdatalake About Pivotal Pivotal, committed to open source and open standards, recently introduced Pivotal One, the world's first comprehensive multi-cloud Enterprise PaaS. The company is also a leading provider of application and data infrastructure software, agile development services, and data science consulting. To learn more visit www.gopivotal.com. Follow Pivotal on Twitter @gopivotal, LinkedIn, and G+ © 2014 Pivotal Software, Inc. All rights reserved.Pivotal, GemFire and HAWQ are trademarks or registered trademarks of Pivotal Software, Inc. in the U.S. and/or other countries. This release contains “forward-looking statements” as defined under the Federal Securities Laws. Actual results could differ materially from those projected in the forward-looking statements as a result of certain risk factors, including but not limited to: (i) adverse changes in general economic or market conditions; (ii) delays or reductions in information technology spending; (iii) the relative and varying rates of product price and component cost declines and the volume and mixture of product and services revenues; (iv) competitive factors, including but not limited to pricing pressures and new product introductions; (v) component and product quality and availability; (vi) fluctuations in VMware, Inc.’s operating results and risks associated with trading of VMware stock; (vii) the transition to new products, the uncertainty of customer acceptance of new product offerings and rapid technological and market change; (viii) risks associated with managing the growth of our business, including risks associated with acquisitions and investments and the challenges and costs of integration, restructuring and achieving anticipated investments and the challenges and costs of integration, restructuring and achieving anticipated synergies; (ix) the ability to attract and retain highly qualified employees; (x) insufficient, excess or obsolete inventory; (xi) fluctuating currency exchange rates; (xii) threats and other disruptions to our secure data centers or networks; (xiii) our ability to protect our proprietary technology; (xiv) war or acts of terrorism; and (xv) other one-time events and other important factors disclosed previously and from time to time in the filings EMC Corporation, the parent company of Pivotal, with the U.S. Securities and Exchange Commission. EMC and Pivotal disclaim any obligation to update any such forward-looking statements after the date of this release. The NSW Centre for Volunteering Reaps Huge Productivity Rewards Thanks to Technology Donation 2014-04-02T05:52:00Z the-nsw-centre-for-volunteering-reaps-huge-productivity-rewards-thanks-to-technology-donation The NSW Centre for Volunteering is speeding up its operations courtesy of a technology donation from EMC Corporation (NYSE: EMC) in partnership with EMC distributor Ingram Micro and partner Always Up IT. The Centre for Volunteering aims to support, educate and inform the state’s 2.5 million volunteers and those who engage them. One of their primary goals is to increase the understanding among volunteers, charities and businesses that volunteering is just as structured and just as necessary as paid employment. Following the implementation last year – which began with Always Up IT optimising the Centre for Volunteering’s bandwidth to ensure applications and data could be moved quickly and consistently – the Centre for Volunteering has seen dramatically faster application speeds. Remote connections for instance, which are particularly important for the staff who work remotely, have seen a 200 per cent increase in speed. Programs that receive very regular use such as Microsoft Word and Outlook open up to 400 per cent faster. As well as boosting productivity among the existing team of staff and volunteers, the technology is forming the basis of a range of initiatives, including a NSW-wide database of volunteers, which the organisation hopes to become the platform for a national database. Currently, there is no such system and a list of available volunteers has to be re-created every time it is needed, which is a drain on staff and volunteer time at the Centre. The technology is also expected to support an upgrade of The Centre for Volunteering’s training capabilities. Through its partnership with Clubs NSW, the Centre can consider stepping up its training courses that are delivered through the systems available in individual clubs. The technology provided to The NSW Centre for Volunteering was an EMC VSPEX Proven Infrastructure, comprising two Cisco Unified Computing System C200 M2 servers, VMware vSphere server virtualisation, EMC Unisphere® storage management and an EMC VNXe® 3100 storage system. Always Up IT architected and installed the infrastructure in the first half of 2013, in addition to providing training to existing staff. The system was an upgrade from Microsoft Windows Small Business Server 2011 running on Dell hardware with SCSI storage drives. With improvements in both speed and capacity, The Centre is now in a much better position to expand into new areas. Customer Quote: Lynne Dalton, Chief Executive Officer, NSW Centre for Volunteering “The EMC VSPEX Proven Infrastructure deployed by Ingram Micro and Always Up IT has already considerably improved our ability to service volunteers and volunteer-engaging organisations in New South Wales. Volunteering is not charity. It’s work and should be seen that way. We see the system being vital to our program of work in the future.” David Fisher Dobbin, Development Manager, The NSW Centre for Volunteering “The government wants to find out more about volunteers in Australia. This includes who is volunteering, what tasks they are performing, where they live and where they participate in volunteering, how old they are and what skills they have. At the moment, every time there is an emergency, we need to gather all that information again. “If we can use the infrastructure to build a system that allows us to know at any time how many volunteers are available, there has to be a benefit to the community when there are extreme weather events or threats.” Partner Quote: Raja Pradeep, Director, Always Up IT “It has been a delight to provide such a worthwhile organisation with the technology to not only improve their current offering, but also to realise their vision for the next stage of volunteer management and training.” EMC Executive Quotes: Alister Dias, Vice President and Managing Director, EMC Australia & New Zealand “It is an honour to know that this technology is supporting the community in such an integral way. If the centre can develop a NSW wide volunteering database, the benefits would be reaped every time there is an urgent need for rapid deployment of volunteers. It would also allow the centre to keep the volunteer community engaged and active. It has been a pleasure to work with Ingram Micro and Always Up IT to help deliver these capabilities to The NSW Centre of Volunteering.”Additional Resources: Read more about EMC’s VSPEX proven architecture here: http://www.emc.com/vspex Connect with EMC ANZ via Twitter, LinkedIn, blog About EMC EMC Corporation is a global leader in enabling businesses and service providers to transform their operations and deliver IT as a service. Fundamental to this transformation is cloud computing. Through innovative products and services, EMC accelerates the journey to cloud computing, helping IT departments to store, manage, protect and analyse their most valuable asset – information – in a more agile, trusted and cost-efficient way. Additional information about EMC can be found at www.emc.com. # # # EMC is a registered trademark of EMC Corporation in the United States and/or other countries. All other trademarks used are the property of their respective owners. Pivotal Appoints Gavin Jones to Lead ANZ Operations 2014-03-26T02:37:00Z pivotal-appoints-gavin-jones-to-lead-anz-operations ​Pivotal Appoints Gavin Jones to Lead ANZ Operations Regions’s first managing director to drive growth and adoption of Pivotal One, the world’s first comprehensive multi-cloud enterprise PaaS Summary Pivotal today announced the addition of Gavin Jones as Managing Director for Australia and New Zealand. In addition to driving growth and adoption of Pivotal technologies, Jones will oversee regional operations. Jones will be based in Sydney and will report directly to Singapore-based Melissa Ries, vice president and general manager of APJ, Pivotal. Salesforce.com and Good Technology veteran to bring 17+ years’ experience of leadership to his new role; strengthening Pivotal’s APJ presence to help support the fast expanding customer and partner network and the creation of a new class of agile developed, data-driven, environment to enable the growing data demand. SYDNEY, March 26, 2014 – Pivotal, the software company at the intersection of big data, PaaS, and agile development, today announced the appointment of Gavin Jones as the Managing Director for Australia and New Zealand. As the county’s first Managing Director, Jones will be responsible for executing the strategy, vision and growth objectives for Pivotal. He will also support the fast expanding customer and partner network and the creation of a new class of agile developed, data-driven, environment to enable the growing data demand. Melissa Ries, vice president and general manager of APJ at Pivotal, said, “The ANZ region has some of the more forward looking companies across our portfolio. We have seen significant interest for Pivotal’s technology and services across the board and is a fast growing market for us. Gavin’s appointment will help us steadily grow and give our customers greater access, attention and insights to support their local business needs.” The appointment of Jones to the newly created the role of Managing Director underpins Pivotal’s continued investment in the region. In 2013, the company held it’s first ever Asia Pacific Pivotal™ Summit 2013 which attracted over 500 customers and partners; opened the Pivotal Innovation Centre, the first Pivotal lab dedicated to helping customers execute advanced Big Data Analytics projects while leveraging Pivotal’s resources and expertise in data science, agile application development, big data and cloud technologies; and secured many new strategic partners and customers. Before joining Pivotal, Gavin was the Vice President and General Manager for Good Technology, the leader in secure mobility solutions and was also with SalesForce.com. He has also held various executive and leadership positions at Oracle, Avaya, Soprano and Sulcus. Speaking on his appointment, Gavin Jones said “Enterprises are increasingly being faced with making data-driven decisions. In order to transform customer experience and drive new revenue streams, our team will work closely with IT & business leaders in the industries to bring together the unique combination of Pivotal’s leading technology, Pivotal Labs and our Data Science teams to unlock this value. I am truly excited to be part of Pivotal’s mission.”Resources Visit the Pivotal APJ Page Visit the Pivotal press center Visit Pivotal’s Blog for a Big Data Case Study Visit Pivotal’s APJ Twitter page: @GoPivotalAPJ About Pivotal Pivotal, committed to open source and open standards, recently introduced Pivotal One, the world's first comprehensive multi-cloud Enterprise PaaS. The company is also a leading provider of application and data infrastructure software, agile development services, and data science consulting. Learn more at www.gopivotal.com. Follow Pivotal on Twitter @gopivotal, LinkedIn, and G+.©2014 Pivotal Software, Inc. All rights reserved. Pivotal is a trademark and/or registered trademark of Pivotal Software, Inc. in the US and/or other countries. This release contains “forward-looking statements” as defined under the Federal Securities Laws. Actual results could differ materially from those projected in the forward-looking statements as a result of certain risk factors, including but not limited to: (i) adverse changes in general economic or market conditions; (ii) delays or reductions in information technology spending; (iii) the relative and varying rates of product price and component cost declines and the volume and mixture of product and services revenues; (iv) competitive factors, including but not limited to pricing pressures and new product introductions; (v) component and product quality and availability; (vi) fluctuations in VMware, Inc.’s operating results and risks associated with trading of VMware stock; (vii) the transition to new products, the uncertainty of customer acceptance of new product offerings and rapid technological and market change; (viii) risks associated with managing the growth of our business, including risks associated with acquisitions and investments and the challenges and costs of integration, restructuring and achieving anticipated synergies; (ix) the ability to attract and retain highly qualified employees; (x) insufficient, excess or obsolete inventory; (xi) fluctuating currency exchange rates; (xii) threats and other disruptions to our secure data centers or networks; (xiii) our ability to protect our proprietary technology; (xiv) war or acts of terrorism; and (xv) other one-time events and other important factors disclosed previously and from time to time in the filings EMC Corporation, the parent company of Pivotal, with the U.S. Securities and Exchange Commission. EMC and Pivotal disclaim any obligation to update any such forward-looking statements after the date of this release. RSA Teams with Pivotal to Offer Security Analytics and Big Data Playbook 2014-02-26T00:03:00Z rsa-teams-with-pivotal-to-offer-security-analytics-and-big-data-playbook RSA® CONFERENCE 2014 --SAN FRANCISCO, February 25, 2013 - News Summary: Today, RSA and Pivotal announced the availability of a Big Data for Security Analytics reference architecture, providing insights into the visibility, analytics and actionable intelligence organisations need to detect and investigate today’s security threats RSA Security Analytics, supported by Pivotal Hadoop technology, help organisations quickly detect, investigate and respond to security incidents before they have the opportunity to impact business The RSA Pivotal Reference Architecture serves as a guide to organisations looking to create a scalable approach to Security Analytics, and also ties into a wider approach to analytics of IT operations data and the creation of an “IT Data lake” Full Story: RSA, The Security Division of EMC (NYSE: EMC), today announced the availability of a new reference architecture created with Pivotal to help organisations add flexibility and power to security analytics while laying the foundation for broader IT analytics investments. Building on the expertise of both RSA and Pivotal, this reference architecture help organisations gain insights into the visibility, analytics and actionable intelligence they need to detect and investigate today’s security threats while also providing a solid foundation for a broader ‘IT Data Lake’ strategy, which helps to control costs and enables organisations to gain maximum value from IT systems. Additionally, the new reference architecture showcases how the technologies from both companies can work together to help organisations investigate and respond to security incidents before they have the opportunity to impact the business. Together, RSA and Pivotal can help security analysts and incident responders with: Greater Visibility through full network packet capture, log collection and contextual data enrichment to spot threats designed to evade detection by common security tools. Enhanced Analytics at the time of packet capture and throughout its lifecycle to its archival and retirement, to spot anomalies and reveal indicators of attack and compromise. Actionable intelligence through data visualisation, feeds of suspicious activity, and prioritisation of alerts that allow analysts to respond appropriately to threats. Enterprise deployability and scale, using distributed, high availability, scale-out architectures that allow for expansion and flexibility to scale to the largest of environments. Flexibility and Agility through the ability to take advantage of new analytics modules and new data sources as they are developed or integrated, ensuring security operations are ‘future—proofed’ as threats and business processes evolve. Leveraging an open Hadoop-based data warehouse, RSA Security Analytics allows customers to take advantage of the innovations coming out of the Hadoop ecosystem. By partnering with Pivotal, RSA is able to offer customers the most complete set of analytics tools on the market today – delivering superior visibility above and beyond traditional log-based solutions while lessening dependence on data science skills. By bringing together the leaders in security analytics and data science, RSA and Pivotal are delivering a foundation for a broader ‘IT Data Lake’ strategy, to help organisations control costs and enable IT to gain maximum value from the analytics and IT Systems.Analyst Quote:Jon Oltsik, Senior Principal Analyst, Enterprise Strategy Group “Big Data is one of the most important trends in IT, but there is still confusion around what technologies to leverage in order to derive maximum value from these disparate information sources. From an information security perspective, modern data centres produce huge amounts of data about themselves that can help improve security availability, performance and efficiency, but it’s often captured in silos and tough to correlate and analyse. The foundation offered by RSA and Pivotal will be extremely valuable not only for organisations looking to bolster security capabilities, but also those considering expanding their Big Data strategy beyond just security.”Pivotal Quote:Todd Paoletti, Vice President, Product Marketing, Pivotal “When it comes to modern day security threats, data is key to stopping the bad guys. RSA is building upon the Big Data expertise at Pivotal that lays the groundwork for a more secure computing environment. With the Big Data for Security Analytics reference architecture organisations now have a forward-looking guide to better stop threats through the use of sophisticated data and analytic techniques.”RSA Executive Quote:Grant Geyer, Vice President, Security Analytics, RSA, The Security Division of EMC “Last year we broke new ground with the launch of RSA Security Analytics and this year we are taking that innovation one step further. By partnering with Pivotal, we are offering customers a new, scalable approach to analytics that goes well beyond security to benefit the full IT organisation”Additional Resources: · Learn More: RSA-Pivotal Security Big Data Reference Architecture · EMC Pulse Blog: RSA & Pivotal: Big Data and Security Done Right · Learn more about RSA Security Analytics · Connect with RSA via Twitter, Facebook, YouTube, LinkedIn and the RSA Speaking of Security Blog and PodcastAbout RSA RSA, The Security Division of EMC, is the premier provider of intelligence-driven security solutions. RSA helps the world’s leading organisations solve their most complex and sensitive security challenges: managing organisational risk, safeguarding mobile access and collaboration, preventing online fraud, and defending against advanced threats. Combining agile controls for identity assurance, fraud detection, and data protection, robust Security Analytics and industry-leading GRC capabilities, and expert consulting and advisory services, RSA brings visibility and trust to millions of user identities, the data they create, the transactions they perform, and the IT infrastructure they rely on. For more information, please visit www.EMC.com/RSA. RSA and EMC are either registered trademarks or trademarks of EMC Corporation in the United States and/or other countries. All other company and product names may be trademarks of their respective owners. ### This release contains “forward-looking statements” as defined under the Federal Securities Laws. Actual results could differ materially from those projected in the forward-looking statements as a result of certain risk factors, including but not limited to: (i) adverse changes in general economic or market conditions; (ii) delays or reductions in information technology spending; (iii) the relative and varying rates of product price and component cost declines and the volume and mixture of product and services revenues; (iv) competitive factors, including but not limited to pricing pressures and new product introductions; (v) component and product quality and availability; (vi) fluctuations in VMware, Inc.’s operating results and risks associated with trading of VMware stock; (vii) the transition to new products, the uncertainty of customer acceptance of new product offerings and rapid technological and market change; (viii) risks associated with managing the growth of our business, including risks associated with acquisitions and investments and the challenges and costs of integration, restructuring and achieving anticipated synergies; (ix) the ability to attract and retain highly qualified employees; (x) insufficient, excess or obsolete inventory; (xi) fluctuating currency exchange rates; (xii) threats and other disruptions to our secure data centres or networks; (xiii) our ability to protect our proprietary technology; (xiv) war or acts of terrorism; and (xv) other one-time events and other important factors disclosed previously and from time to time in the filings of EMC Corporation, the parent company of RSA, with the U.S. Securities and Exchange Commission. EMC and RSA disclaim any obligation to update any such forward-looking statements after the date of this release. RSA Enables New Generation of Managed Security Services to Help Enterprises Better Detect and Respond to Advanced Threats Verizon Among Key RSA Partners to Deliver Advanced Threat Analytics to Enterprises 2014-02-25T00:18:00Z rsa-enables-new-generation-of-managed-security-services-to-help-enterprises-better-detect-and-respond-to-advanced-threats-verizon-among-key-rsa-partners-to-deliver-advanced-threat-analytics-to-enterprises RSA CONFERENCE 2014 – San Francisco – February 24, 2014 News Summary: Enterprise customers of all sizes will soon be able to benefit from the latest capabilities in advanced cyber defences such as Big Data security analytics, critical incident response and vulnerability management as fully managed security services thanks to a new RSA partner program, anchored by global MSSP Verizon Enterprise Solutions. The RSA Managed Security Program is designed to enable a new generation of managed security services to leverage intelligence-driven security solutions including RSA® Security Analytics. These new services tap into RSA’s advanced, intelligence-driven Security Operations Center (SOC) capabilities for enterprises to accelerate the detection, investigation, remediation, and management of security incidents and vulnerabilities.   RSA has signed Verizon Enterprise Solutions as its marquee global partner. In addition, RSA has signed three additional MSP partners, including Foreground Security, DataShield Consulting and Communication Valley Reply. Full Story:        RSA, The Security Division of EMC (NYSE: EMC), today announced a new program designed to enable a new generation of managed security services, leveraging intelligence-driven security solutions such as RSA Security Analytics, to help enterprises better detect and mitigate advanced threats. RSA also announced it has signed Verizon Enterprise Solutions as its marquee global services partner along with three other managed security service providers to reach enterprise customers around the world.        Cyber threats have become so invasive and damaging, and attacks so widespread that legacy perimeter- or signature-based security controls and organisations with limited or immature security capabilities are finding themselves outmatched. The challenge for security practitioners is how to combat new and advanced targeted and persistent attacks in an environment of outdated security technologies and incident management processes amid a shortage of appropriately skilled security personnel.        The RSA Managed Security Partner (MSP) program provides a technology platform and accompanying professional services and training derived from RSA's industry-leading portfolio, to enable select partners to offer fully managed security and critical incident response services to customers. It leverages RSA’s advanced, intelligence-driven Security Operations Center (SOC) capabilities, making them available and accessible to enterprises of all sizes to help accelerate the detection, investigation, remediation, and management of security incidents and vulnerabilities.        According to the Verizon 2013 Data Breach Investigations Report, 85 per cent of compromises took hours or less. Disturbingly, in 66 per cent of cases, the breach wasn’t discovered for months or even years – a nearly 20 per cent jump over the previous year.  Additionally, the report indicates that in 22 per cent of cases, it took months to contain the breach.    RSA provides MSP program members with the ability to rapidly adopt and build services around proven advanced security operations solutions including RSA Security Analytics, the RSA® Critical Incident Response Solution, RSA® Security Operations Management solution, RSA ECAT software, and RSA® Advanced Cyber Defense Practice. Together the RSA products and services are designed to enable RSA MSP program members to deliver the following capabilities to their customers: Comprehensive visibility, incorporating full network packet capture, logs, events, endpoint-sourced data, asset information, location of sensitive content, vulnerability information and other business and technical context Advanced security monitoring for detection, investigation, remediation, and management capabilities in a cost effective, off-the-shelf, modular yet integrated portfolio/solution Improved threat detectionand investigative value that automatically enriches internally collected security telemetry with external threat and custom intelligence data Prioritised investigations and activity analysis based on customer or MSSP context, criticality, and the location of sensitive data Advanced endpoint malware detection and cleanup on endpoints and via the network without depending on file signatures Security incident management via customised advanced workflow management, notification and reporting functionality for incident management by MSSP or customer Skills enhancements for MSSP analysts via advanced security training and certification    Other partners joining the program include: Foreground Security and DataShield Consulting in the United States and Communication Valley Reply in Europe.RSA Executive Quote:Amit Yoran, Senior Vice President, RSA, The Security Division of EMC “Good enough security isn't good enough anymore. Organisations are compromised daily through the proliferation of advanced malware and the myriad opportunities that malicious actors have to mount cyber attacks. Security strategies and managed services that rely on an antiquated understanding of perimeter controls and legacy log monitoring methods can’t provide the deep visibility or intelligence needed for enterprises to detect and deal with today's threats. RSA leads the way in defining and delivering intelligence-driven security solutions. RSA provides the market-leading capabilities for next generation visibility to the enterprise and advanced analytics-based contextual understanding through solutions that create the agility needed to manage business risk accordingly. Together with our Managed Security Partners, we're now able to make these innovative capabilities accessible to, and that level of defence achievable for, almost any enterprise."Christina Richmond, Program Director, Infrastructure Security Services, IDC"There's a security adage that ‘bad guys only have to be right once, while good guys need to be right every time.’ While no security is ever 'right' all the time, the attack surface has grown so wide and attackers so aggressive, organisations need to increase the ratio of right versus wrong. Once only accessible among elite organisations, security analytics capabilities like those offered by RSA have democratised and automated intelligence gathering and analysis. RSA and its managed security service partners are leading the way to make these powerful capabilities available to a broader set of customers that are struggling to defend their enterprises against sophisticated threats.”Managed Security Partner Quotes:Eddie Schwartz, Vice President, Global Security Solutions, Verizon Enterprise Solutions“By joining forces with RSA, Verizon is able to strengthen its strategic analytics capabilities to better protect enterprises. Combined with our deep threat intelligence, world-class MSSP capabilities and the unparalleled insight we gain from our global IP network, we will be better equipped to help clients swiftly recognise and respond to complex threats.”David Amsler, President and CIO of Foreground Security.“As a dedicated cyber security service provider and the only RSA Authorized Services Network Level 3 partner in the United States, Foreground Security is proud to now be one of the first RSA Managed Security Program partners. Organisations confronting more sophisticated cyber attacks, severe security talent shortages and other urgent challenges can benefit from the full array of Foreground and RSA’s security management expertise, tailored and supported by Foreground’s highly-experienced staff of over 100 CISSP and/or CSIRC certified experts. This new program keeps Foreground and RSA on the cutting edge of innovation, tools, capabilities, and threat intelligence and helps to change the managed security model away from reactive, signature-based security to a new intelligence- and analytics-driven model that provides actual value to our clients.”Michael Malone, CEO, DataShield Consulting"The evolving nature and explosive propagation of mal-weaponry that makes APT-style cyber-attacks possible cannot be defeated through conventional means. Intelligence-driven continuous monitoring of threat-based activity is required to protect the enterprise. In order to achieve the desired result, organisations must employ the required people, processes and technology to operationalise a threat-focused defence. This is where RSA and DataShield can help. RSA provides best-in-class technology and DataShield the proven processes and skilled resources to make next generation cyber defence a reality. As an RSA Managed Security Program partner, DataShield has the experience and skill sets to fill the void for organisations that are both head count and expertise constrained when attempting to detect and analyse threats. Enterprises want and need the actionable incident data to respond to adverse events that they aren't getting today with other technologies and services."Guido Guerrieri, Executive Partner at Communication Valley Reply"Recognising Communication Valley Reply as the first European RSA Managed Security Program partner is an important milestone that underpins our continuous investment to support clients in the adoption of the best security solutions. Our world-class Security Operations Centre helps our clients protect their corporate environment and exploit the technology to its potential, effectively responding to any cyber-attacks quickly and securely. RSA leads the way in providing great technology, while Communication Valley Reply's services will assure clients that skilled people are watching 24x7 and constantly developing solutions that help protect the cyber security of their company.”Additional Resources: Learn more about the RSA Managed Security Partner program Read more about this story on EMC Pulse: “A New Generation of Managed Security Services for Advanced Cyber Defense” Learn more about the RSA solutions and services included within the RSA MSP program including RSA Security Analytics, the RSA Critical Incident Response Solution, RSA Security Operations Management solution, RSA ECAT software, RSA Web Threat Detection software, and RSA Advanced Cyber Defense Practice Connect with RSA via Twitter, Facebook, YouTube, LinkedIn and the RSA Speaking of Security Blog and Podcast About RSA RSA, The Security Division of EMC, is the premier provider of security, risk, and compliance- management solutions for business acceleration. RSA helps the world's leading organisations succeed by solving their most complex and sensitive security challenges. These challenges include managing organisational risk, safeguarding mobile access and collaboration, proving compliance, and securing virtual and cloud environments. Combining business-critical controls in identity assurance, encryption & key management, SIEM, Data Loss Prevention, and Fraud Protection with industry-leading GRC capabilities and robust consulting services, RSA brings visibility and trust to millions of user identities, the transactions that they perform, and the data that is generated. For more information, please visit www.EMC.com/RSA. RSA, EMC, Security Analytics, Critical Incident Response Solution, Security Operations Management and Advanced Cyber Defence Practice are either registered trademarks or trademarks of EMC Corporation in the United States and/or other countries. All other company and product names may be trademarks of their respective owners. ### This release contains “forward-looking statements” as defined under the Federal Securities Laws.  Actual results could differ materially from those projected in the forward-looking statements as a result of certain risk factors, including but not limited to: (i) adverse changes in general economic or market conditions; (ii) delays or reductions in information technology spending; (iii) the relative and varying rates of product price and component cost declines and the volume and mixture of product and services revenues; (iv) competitive factors, including but not limited to pricing pressures and new product introductions; (v) component and product quality and availability; (vi) fluctuations in VMware, Inc.’s operating results and risks associated with trading of VMware stock; (vii) the transition to new products, the uncertainty of customer acceptance of new product offerings and rapid technological and market change; (viii) risks associated with managing the growth of our business, including risks associated with acquisitions and investments and the challenges and costs of integration, restructuring and achieving anticipated synergies; (ix) the ability to attract and retain highly qualified employees; (x) insufficient, excess or obsolete inventory; (xi) fluctuating currency exchange rates; (xii) threats and other disruptions to our secure data centers or networks; (xiii) our ability to protect our proprietary technology; (xiv) war or acts of terrorism; and (xv) other one-time events and other important factors disclosed previously and from time to time in the filings of EMC Corporation, the parent company of RSA, with the U.S. Securities and Exchange Commission.  EMC and RSA disclaim any obligation to update any such forward-looking statements after the date of this release. China Rates Itself As World’s #1 In Deploying Technologies To Establish Trusted IT Infrastructure 2013-11-20T07:08:00Z china-rates-itself-as-world-s-1-in-deploying-technologies-to-establish-trusted-it-infrastructure China Rates Itself As World’s #1 In Deploying Technologies To Establish Trusted IT Infrastructure Global Survey Reveals Startling Low Confidence Levels in Ability to Avert Unplanned Downtime, Security Breaches and Data Loss HOPKINTON, Mass. – Nov 19, 2013 – EMC® Corporation (NYSE:EMC) today revealed a wave of fresh insights about the IT strategies and infrastructures deployed within companies and governments throughout the world. Most notably, respondents cite a startling lack of senior executive confidence that permeates organisations globally, specifically concerning readiness around the critical IT requirements of continuous availability; advanced security; and integrated backup and recovery. Reduced investment in these critical areas threatens the ability of IT infrastructures to withstand and quickly recover from disruptive incidents such as unplanned downtime, security breaches and data loss and underscores the need to adopt progressive strategies to achieve Trusted IT infrastructures. View complete survey details here. The Global IT Trust Curve survey, administered by independent market research firm Vanson Bourne, spans 3,200 interviews across 16 countries and 10 industry sectors. China received the top maturity ranking: Chinese IT decision makers reported implementing the highest concentration of sophisticated continuous availability, advanced security, and integrated backup and recovery technologies. The United States ranked second in maturity on the IT Trust Curve. Underscoring swift and aggressive technology investments to solidify their world influence, three of the four most mature countries -- China, South Africa and Brazil -- are BRICS nations. Japan ranked last on the IT Trust Curve in the16-nation survey. David Goulden, EMC President and Chief Operating Officer, said, “The four big megatrends in information technology today are cloud computing, Big Data, social networking and mobile devices. Adoption and maturity of these trends must float upon a sea of trust — trust that my information is secure in the cloud, trust that my data won’t be lost or stolen, trust that my IT will be operational when it needs to be — which, these days, is all the time. The more trust that can be earned and guaranteed, the bigger and faster the impact of these trends. Conversely, the less trust that is established, the more limited these trends will be. Where countries fall on the IT Trust maturity curve could affect their overall ability to compete.” Chief among the findings are: Lower levels of maturity permeate the globe: More than half (57%) of all respondents fall into the lower maturity categories, while only 8% place in the Leader category. The higher organisations land on the maturity curve, the more likely they are to have already implemented more strategic and leading-edge technology projects such as Big Data Analytics. Lack of confidence in technology infrastructure: Nearly half (45%) of all respondents globally report that their senior executives are not confident that their organisations have adequate availability, security, and backup and recovery capabilities. In Australia this number decreases to 41%. When asked about executive confidence levels, the percentage of all respondents within each maturity level who said their senior executives are confident that their organisations have adequate availability, security, and backup and recovery are: Laggard (39%), Evaluator (51%), Adopter (65%) and Leader (81%). Within Australia, the percentages who report their senior teams are confident are: Laggard (33%), Evaluator (45%), Adopter (76%) and Leader (86%). Japan has the smallest percentage of respondents (31%) reporting that their senior teams have confidence in these key aspects of IT; Germany has the highest percentage (66%). 19% (nearly one in five) of respondents worldwide cite an overall lack of confidence in their technology infrastructure. In Australia this number decreases to 14%. Significant disparity exists between how IT and business leaders perceive improvements: While 70% of IT decision makers consider the IT department to be the motivation/drive for future resilient and secure IT infrastructure, the number drops to 50% for business decisions makers when asked the same question. The split within Australia is 61% of IT decision makers and 42% of business decision makers. A similar perception gap extends in key disciplines such as security. While 27% of IT respondents report being victims of a security breach in the past 12 months, only 19% of business decision makers globally report being victims, indicating they are not aware of all technology incidents that impact the business. The overall average of 23% compares to 21% of all respondents within Australia reporting being victims of a security breach. Organisations with higher levels of maturity avoid – and recover more quickly from – disruptive incidents and with reduced consequence. For example, globally: 53% of organisations in the Leader segment of the IT Trust Curve reported data recovery time measured in minutes or less for their most mission critical applications. The percentage drops to 27% across all maturity tiers. 76% of companies in the Leader segment believe they are able to recover 100% of their lost data in every instance versus only 44% in the lowest maturity segment. Organisations in the lowest maturity segment (Laggard) lost one and a half times more money over the last 12 months as a result of downtime than those in the highest maturity segment (Leader). Security breaches were the most costly events suffered by respondents globally, who reported an average annual financial loss of $860,273 due to breaches, followed by $585,892 and $497,037 respectively for data loss and downtime. In Australia the averages were $963,947 for security breaches, $701,304 for data loss and $215,776 for downtime. Widespread unplanned downtime, security breaches and data loss: 61% of all respondents’ companies have suffered at least one of the following incidents: unplanned downtime (37%), security breach (23%) or data loss (29%) in the last 12 months. In Australia, the percentages change to: unplanned downtime (32%), security breach (21%) and data loss (24%) in the last 12 months, with 54% experiencing at least one of these. Top 4 consequences across organisations experiencing at least one of the above incidents within the last 12 months were loss of employee productivity (45%), loss of revenue (39%), loss of customer confidence/loyalty (32%) and loss of incremental business opportunity (27%). Within Australia, the results change to the following: loss of employee productivity (47%), loss of revenue (37%), loss of business to a competitor (32%), and loss of customer confidence/loyalty (30%). Budget constraints (52%) reigned as the #1 obstacle to implementing continuous availability, advanced security, and integrated backup and recovery solutions. Resources and/or workload constraints (35%), poor planning (33%) and knowledge & skills (32%) rounded out the top four. China was the only country that did not report budget as the #1 obstacle, instead sighting resources and/or workload constraints (50%). Within Australia, the top constraints are: budget (56%), knowledge & skills (38%), planning and anticipation (30%), and resources and/or workload constraints (29%) Top security concerns identified across all respondents were third party application access (43%) and protection of intellectual property (42%), pointing to the need for more advanced technology and intelligence-driven models: There remains a heavy reliance on “prevention-oriented” security tools, with more than 80% of respondents using anti-virus and firewalls as the two most popular security solutions. Just 18% have adopted Security Information and Event Management (SIEM) and even fewer, 11%, have adopted Governance Risk and Compliance (GRC) solutions, which provide the necessary monitoring and response capabilities needed to defend against more advanced threats. Highly-regulated industries throughout the world displayed proportionally higher maturity levels: In addition to the IT and Technology (#3) industries, the remaining Top 5 most mature industries globally are the highly-regulated Financial Services (#1), Life Sciences (#2), Healthcare (#4) and Public Sector (#5). Executive and Analyst Quotes Irina Simmons, Chief Risk Officer, EMC “Most IT practitioners do everything within their power and control to protect the enterprise. Where breakdowns can occur is in communicating up to business leaders, executives, Boards and audit committees. We hear it from Boards all the time. Practitioners need to be able to demonstrate to leadership that they have a governance process whereby they can adequately instil confidence that risks are being addressed in line with the organisation’s overall risk appetite and profile. Success against a particular threat is not just an accident or good luck, but the result of a solid process that continually monitors and addresses new risks and threats to the enterprise.” Dave Martin, Chief Security Officer, EMC “The time has come for the industry to double down. It’s impossible to deliver advanced security if we lack foundational maturity. Without a predictable environment, or understanding of where our assets are, or an ability to pick up on nuances and detect behavioural anomalies, we will be unable to defend the organisation. That baseline of foundational maturity is an absolute enabler of effective security and establishing overall trust.” Christian Christiansen, Program Vice President for IDC's Security Products and Services Group. “Among the many powerful insights that flow from this global study, the rampant lack of senior executive confidence stands out as both alarming and, unfortunately, a sign of the times. Nearly half of respondents say their senior management has zero confidence that their organisations are prepared with adequate availability, security, and backup and recovery. That one startling fact stands as a wakeup call for company boards to make the necessary investments to brace against both external and self-imposed disruptions and threats to their IT systems and data.” Additional Resources View full survey results at the IT Trust Curve interactive microsite Video: Irina Simmons, Chief Risk Officer, EMC Video: Dave Martin, Chief Security Officer, EMC Reflections Blog: Why 45% of Executives Lack Confidence in Their IT Connect with EMC via Twitter, Facebook, YouTube, and LinkedIn Methodology Survey data is the result of 3200 interviews of 1600 IT and 1600 business decision makers from the United States, the United Kingdom, Canada, Brazil, France, Germany, Italy, Spain, Russia, India, South Africa, Australia, Japan, China and the Nordic and Benelux regions. Respondents were employed at companies within ten industry sectors, with 50% working for organisations with 100-1000 employees and the other 50% at organisations with more than 1000 employees. To create the maturity curve, IT decision-makers were asked specific questions relating to IT infrastructure in each of the three pillar sections, continuous availability, advanced security and integrated backup and recovery. Within each section, respondents scored points for the sophistication of their organisation’s existing technology, but not for anything in the planning stages. Each section was scored out of a total of a maximum of 18 points and combined to give a total overall maturity score out of 54. This score was then multiplied by a scaling factor to normalise the curve and give a total score out of 100 points. Once scored, these IT decision-makers were divided into four even segments from a low to high score; Laggards (scoring 1–25), Evaluators (scoring 26-50), Adopters (scoring 51-75) and Leaders (scoring 76-100). About EMC EMC Corporation is a global leader in enabling businesses and service providers to transform their operations and deliver IT as a service. Fundamental to this transformation is cloud computing. Through innovative products and services, EMC accelerates the journey to cloud computing, helping IT departments to store, manage, protect and analyse their most valuable asset — information — in a more agile, trusted and cost-efficient way. Additional information can be found at www.emc.com. About Vanson Bourne Vanson Bourne is an independent specialist in market research for the technology sector. Our reputation for robust and credible research-based analysis, is founded upon rigorous research principles and our ability to seek the opinions of senior decision makers across technical and business functions, in all business sectors and all major markets. For more information, visit www.vansonbourne.com. ### EMC is a registered trademark of EMC Corporation. All other trademarks used are the property of their respective owners. EMC Announces New Proven Solutions For Microsoft and Support for Windows Server 2012 2012-06-12T02:07:00Z emc-announces-new-proven-solutions-for-microsoft-and-support-for-windows-server-2012 HOPKINTON, Mass. – June 11, 2012 News Summary: EMC today announced: Simplified operational management and accelerated deployments of cloud environments via new Microsoft-focused EMC Proven™ Solutions on EMC VNX and EMC Symmetrix VMAX to help customers maximize performanceCollaboration with Microsoft to deliver Microsoft Private Cloud Fast Track Configurations based on EMC VNX.80% faster storage infrastructure provisioning and expanded support for EMC Storage Integrator 3.1, an agentless, no-charge plug-in for Microsoft technologies Leadership and commitment to support Windows Server 2012 -- including Server Message Block (SMB) 3.0 and Offload Data Transfer (ODX) -- across EMC’s broad portfolio of storage, backup and recovery products following Microsoft’s general availability.EMC VNX was selected as the storage platform that Microsoft will use to showcase SMB 3.0 version and ODX functionality for Windows Server 2012 during the Microsoft TechEd keynote address. Full Story: EMC Corporation (NYSE:EMC) today announced new EMC Proven Solutions™ and Microsoft Private Cloud FastTrack configurations to help Microsoft customers successfully transform and accelerate their Microsoft applications environments to the cloud. The new solutions and configurations provide detailed design best practices for accelerating deployments of virtualized Microsoft Private Cloud environments. New solutions address requirements for simplified management of Microsoft Private Clouds based on Windows Server Hyper-V. The EMC Proven Solutions maximize performance and recovery in mixed Microsoft application workload environments including MS SQL Server, MS SharePoint and MS Exchange leveraging MS Hyper-V on EMC VMAX and VNX platforms. Additionally, EMC has expanded EMC Storage Integrator (ESI) 1.3 support for Microsoft, which enables Windows administrators more autonomy and self-service management of storage provisioning in physical and virtual environments. These tools simplify the mapping and provisioning of storage for an application using simple, wizard-based steps. New support is announced for Windows Server Hyper-V, Microsoft SharePoint, Microsoft native Remote BLOB Storage (RBS) and Windows PowerShell. EMC also announced broad technology support for Microsoft Windows Server 2012 across storage and backup products following the general availability from Microsoft. This support continues EMC’s leadership in helping customers transform Windows environments by leveraging the simplicity of CIFS to simplify management while delivering increased performance, availability and lower costs. In the recent bi-annual global update published by leading industry analyst firm, IDC, in their Storage User Demand Survey (SUDS) report, EMC is named as the #1 choice for mission critical applications for Microsoft SharePoint, Microsoft Exchange, Business Intelligence Analytics, Oracle Applications, SAP, Home Directory, Virtual Desktop Infrastructure (VDI) & Virtual Server as ranked by customers in an extensive study. Results show that more customers choose EMC storage for deployments of Microsoft SharePoint and Microsoft Exchange for their mission critical applications than any other vendor in the first half of 2011. EMC, as a leading information infrastructure provider for Microsoft applications, provides customers running Microsoft applications with the availability, protection, and automation needed to gain competitive advantage. New EMC Proven Solutions The new EMC Proven Solutions announced today are: EMC Infrastructure for Microsoft Private Cloud enabled by EMC VNX5300, Replication Manager, Windows Server Hyper-V, Microsoft Exchange, SharePoint, SQL Server, System Center: This solution documents a complete, cloud-ready infrastructure capable of delivering high performance and maximum flexibility for mixed Microsoft application workloads with full recovery from hardware failures within minutes leveraging storage replication. The new solution also delivers simplified storage infrastructure monitoring through Microsoft System Center Operations Manager (SCOM) integrated with EMC System Center Management pack, as well as simplified storage provisioning for Microsoft administrators through EMC Storage Integrator (ESI). EMC Automated Performance Optimization for Microsoft Applications enabled by EMC VMAX, FAST VP, and Windows Server Hyper-V: This solution enhances scalability and performance for shared application workloads using EMC Fully Automated Storage Tiering for Virtual Pools (FAST VP) and highlights the ease of management with Microsoft System Center Virtual Machine Manager (VMM). New Microsoft FastTrack Configurations With EMC VNX5300 The Microsoft Private Cloud Fast Track program enables administrators to establish and accelerate a pre-configured private cloud. A joint effort between Microsoft and partners such as EMC, the Fast Track program helps organizations quickly develop and implement private clouds while reducing both cost and risk. New configurations from EMC combine Microsoft software including Windows Server and Microsoft System Center with EMC VNX5300 arrays with industry leading server technology. These configurations are supported by documented technical best practices to help accelerate deployments and simplify management. EMC Announces Broad Support For Windows Server 2012 As a long-standing partner for Microsoft, EMC invests heavily in joint engineering resources and expertise to test and validate the latest upcoming versions of Microsoft software on EMC infrastructure. Continuing on this long tradition of cooperative engineering, EMC is committed to delivering broad storage platform support for Windows Server 2012, including SMB 3.0 and ODX across EMC VNX, EMC VMAX, EMC Isilon after Microsoft’s general availability. VNX will also support the Windows BranchCache feature which is designed to maximize performance for Microsoft users accessing a centralized IT infrastructure from remote office locations over Common Internet file system (CIFS) protocols. EMC is also announcing support for EMC Avamar, EMC NetWorker and EMC Data Domain backup and recovery products. This extensive level of support for Windows Server 2012 ensures EMC and Microsoft customers the ability to confidently deploy centralized cloud infrastructure leveraging new Microsoft technologies with efficient data protection using EMC’s latest backup, recovery and de-duplication technologies. EMC also delivers consulting expertise in applications, virtualization, and data centers to help Microsoft clients create well-managed virtual environments – across data centers and desktops. EMC’s Microsoft-certified consultants have expertise designing Microsoft Cloud and Microsoft System Center solutions to help customers transform their IT infrastructure, reduce costs, improve application availability and enhance service delivery. Customer Quote: Peter Singh, Senior Manager, IT Operations, Toronto District School Board “EMC’s VNX unified storage has the best of everything at a very cost-effective price. It integrates with Microsoft Hyper-V, which is crucial to our cloud strategy, and with its higher performance, automated tiering and thin provisioning, VNX was a no-brainer.” Microsoft Executive Quote: Brad Anderson, Corporate Vice President, Microsoft Corporation “Windows Server 2012 and System Center 2012 are optimized for the cloud and have new technologies designed to help customers as they move to the cloud. EMC is dedicated to helping customers deploy solutions that will drive bottom line business results.” EMC Executive Quote: Prasad Rampalli, Senior Vice President, Solutions Group, EMC Corporation “EMC continues to provide customers with simplified management and control in virtualizing and transforming their Microsoft application environments. For more than a decade EMC and Microsoft have helped customers to efficiently and securely scale their solutions to derive the full benefit of cloud computing. This announcement represents the enormous value that can be derived through joint collaboration to help customers simplify, transform and accelerate their journey to the cloud.” About EMC EMC Corporation (NYSE: EMC) is the world’s leading developer and provider of information infrastructure technology and solutions that enable organizations of all sizes to transform the way they compete and create value from their information. Information about EMC’s products and services can be found at www.emc.com. Additional Resources Learn more about partnering with EMCRead about EMC Solutions for MicrosoftRead about EMC Consulting for Microsoft PlatformsLearn more about ESI at Chuck’s BlogLearn more about Microsoft at www.microsoft.com Join the #EMCChannel conversations on Twitter.Connect with EMC via Twitter, Facebook, YouTube, LinkedIn and ECN ### 1IDC, "Storage Users Demand Study 2011 - Fall Edition: Customers Still Want Choice" (2011 / Doc # 234651) EMC and Velocity are either registered trademarks or trademarks of EMC Corporation in the United States and other countries. Microsoft and all product and company names herein may be trademarks or registered trademarks of their registered owners in the United States and in other countries. Other products and/or services are trademarks of their respective owners. Customers Worldwide Choose EMC as #1 Storage in Mission Critical Environments 2012-06-12T01:20:00Z customers-worldwide-choose-emc-as-1-storage-in-mission-critical-environments HOPKINTON, Mass. – June 11, 2012 News Summary: According to a latest IDC Storage Users Demand Study, measuring how storage capacity is consumed by the most widely-used business applications, in the first half of 2011, EMC—ranked again—as the leading provider of storage technology in Oracle, Microsoft Exchange and SharePoint, SAP, Business Intelligence and Analytics, Virtual Desktop Infrastructure and Home Directory environments.The IDC Storage Users Demand Study 2011 - Fall Edition findings are based on the survey of 1,000 respondents representing 15 countries and across 19 industries with company size ranging from 50 employees to over 10,000 employees.In related news, today EMC also announced new proven solutions for Microsoft and support for Windows Server 2012. Full Story: EMC Corporation (NYSE: EMC) today announced it is ranked by customers across the globe as the #1 storage choice for mission critical environments, according to the latest end-user study from IDC. The survey ranks storage vendors based on customer deployment patterns within the most widely-used enterprise applications. According to the IDC study, more customers choose EMC storage than any other vendor’s for their Oracle, Microsoft Exchange and SharePoint, SAP, Business Intelligence and Analytics, Virtual Desktop Infrastructure and Home Directory environments. The results of the IDC study are based on the survey of 1,000 respondents representing 15 countries and across 19 industries with company size ranging from 50 employees to over 10,000 employees, which was completed in Fall 2011. The survey focused primarily on applications, enabling IDC to ascertain end-user sentiment regarding their preference toward certain brands based on specific applications. Customer Quotes Dan Hein, Director of Global IS Shared Services, Columbia Sportswear “Our challenge was to build a data center with new levels of automation and the highest levels of protection. We evaluated many vendors and ultimately selected EMC because of the features in EMC VMAX™—and its strength in SAP environments, EMC’s holistic view on storage with a variety of technologies and industry leading solutions that we knew we could count on.” Angelic Gibson, Director of IT Operations, American Tire Distributors “EMC has enabled us to scale our environment, add more power on-demand with no downtime and without any impact to our users. We can provide better performance, scalability and availability with no downtime – a major benefit to us. All the while, we’ve managed to remain transparent to the customer, delivering services to them seamlessly. We've had great success with EMC VNX™ unified storage and VMware technologies and both companies have been integral along our journey. In addition, through the use of VMware server virtualization we have the ability bring up new application tiers for Oracle eBusiness Suite in less than 20 minutes, without application downtime.” Dennis Robinson, Director, Technical Infrastructure, GENEX Services, Inc. “GENEX provides insurers, employers and third party administrators with managed care solutions and information management capabilities. In order to grow our business it is critical to be able to scale our IT infrastructure and crunch large chunks of data efficiently and cost effectively. Since replacing our legacy storage and deploying EMC VNX unified storage and FAST Suite technology in a VMware vSphere environment, we've seen a major difference in our overall performance and have increased our business agility with the ability to handle multiple transactions at a time. Virtualizing Oracle on EMC storage with VMware vSphere has played a key role in accelerating our journey to the cloud. We're pleased to see EMC investing in validated solutions that help us capture the potential performance enhancements and cost savings available with an integrated EMC, VMware and Oracle environment.” Daniel Mettling, Information Technology Manager, Park Industries, Inc. “The availability of our SQL Server environment is absolutely critical to our business. Downtime means we can’t place sales orders, issue work orders for the shop floor or log service calls. Since implementing VNXe™, we’ve had 100% availability of SQL Server and all other applications in our virtualized environment.” John Orbaugh, Director of Technology, Tyler Independent School District “We compared the cost of doing things the old way, before we transformed our IT infrastructure with EMC, which would involve replacing our physical computers every few years, instead delivering virtual desktops from our existing hardware. The ROI analysis showed that we will save an astonishing $1.3 million in just one year and more than $3 million over five years.” Industry Analyst Quote Natalya Yezhkova, Research Director, IDC's Worldwide Storage Systems Research and Lead Analyst, Storage Users Demand Study (SUDS) “IDC initiated its biannual worldwide survey of storage administrators that analyzes how storage capacity is consumed by the major data use cases from the most widely-used business applications to IT infrastructure support. The data suggests that EMC, which accounted for nearly a quarter of external terabytes shipped worldwide in the first half of 2011, shipped more storage than any other enterprise storage systems supplier to run eight out of nine major data use cases we surveyed.” EMC Executive Quote Jeremy Burton, Executive Vice President and Chief Marketing Officer, EMC “Whether in traditional, next-generation virtualized cloud, Big Data or Hybrid Cloud, customers are choosing EMC as their #1 choice for the most mission critical application environments. Our product and technology innovation centered on helping customers handle the data deluge driven by the two hottest trends in IT—the transition to cloud computing and the management of Big Data.” Additional Resources: Read about EMC Solutions for OracleRead about EMC Solutions for SAPRead about EMC Solutions for MicrosoftRead about EMC Solutions for Business Intelligence and AnalyticsRead about EMC Solutions for VDIConnect with EMC via Twitter, Facebook, YouTube and LinkedIn About EMC EMC Corporation is a global leader in enabling businesses and service providers to transform their operations and deliver IT as a service. Fundamental to this transformation is cloud computing. Through innovative products and services, EMC accelerates the journey to cloud computing, helping IT departments to store, manage, protect and analyze their most valuable asset — information — in a more agile, trusted and cost-efficient way. Additional information about EMC can be found at www.EMC.com. ### 1IDC, “IDC’s Storage Users Demand Survey 2011 - Fall Edition: Customers Still Want Choice, #234651” EMC, VNX, VNXe and VMAX are either registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners. RSA Archer eGRC Platform Provides Customers 572% Risk-Adjusted ROI, According to Leading Analyst Firm 2012-06-06T01:29:00Z rsa-archer-egrc-platform-provides-customers-572-risk-adjusted-roi-according-to-leading-analyst-firm ARCHER SUMMIT, CHIGAGO, IL – June 5, 2012 News Summary: An April 2012 study by Forrester Consulting finds that current RSA Archer™ customers achieved a risk-adjusted Return-on-Investment (ROI) of 572% based on quantified key benefits.Customer participants in the study identified numerous benefits through their RSA Archer platform implementations including lower risk exposure, process automation, increased productivity and consolidation of unnecessary management software and systems.The findings were announced at the 2012 RSA Archer GRC Summit, a gathering of 600 GRC professionals in Chicago. Full Story: RSA, The Security Division of EMC (NYSE: EMC) today announced the results of a recent report from Forrester Consulting outlining the total economic impact (TEI) and potential return on investment (ROI) that enterprises may realise by deploying the RSA Archer Platform for enterprise Governance Risk and Compliance (eGRC). The findings were announced at the 2012 RSA Archer GRC Su mmit in Chicago, and detail the results of an April 2012 survey of current RSA Archer customers who provided insights and opinions on how their organizations achieved a composite organization 3-year risk-adjusted ROI of 572% based on quantified key benefits. Through interviews with RSA Archer customers, Forrester analysts identified key benefits of investing in the Archer Platform including: The ability to reassign a firm’s information risk management staff to conduct analysis instead of task-based workMore effective IT security expenditures with better understanding and allocation of needed protectionIncreased productivity (reducing their compliance process burden) for non-risk management staff engaged in some GRC activitiesLower risk exposure and incident occurrenceRetiring obsolete third-party software “It’s satisfying to hear customers attesting to the kind of positive transformation and ROI experienced through their implementation of the RSA Archer eGRC platform,” said Amit Yoran, Senior Vice President and General Manager, Security Management and Compliance at RSA. “In addition to the investments we’ve made to improve the usability and functionality of the Archer platform, it’s the Archer customer community – their collective ideas, feedback and our continuous communication with them that makes this success possible.” The interviews conducted for this study involved representatives from global companies in the energy, financial services, electronics manufacturing and entertainment sectors. These interviews uncovered a number of valuable insights, including: “The RSA Archer platform gives us a common language,” noted an interviewee. “Audit can talk about the same high-risk item as compliance, and they now use the same vocabulary, which all started in IT.” “If we developed in another platform other than RSA Archer, we would double or triple what we are paying for RSA Archer,” according to another study participant.Another customer participant said: “With the first iteration of our adoption of [RSA] Archer, we moved into what I consider to be the start of the Industrial Era where we built a machine that allowed us to wield these (risk) assessments on a far broader scale, with a larger degree of automation, and we improved our efficiency.”“Our intent is to do more analysis of the investments we make, and make the right investments,” said another RSA Archer customer in the report. “[RSA] Archer increases chances of matching the value of an investment versus the cost. We can’t correlate the risks using Excel. We need to use a mature, consistent process… that's the biggest value of GRC and RSA Archer is the tool to make that possible.” The RSA Archer platform is designed to enable an efficient, collaborative eGRC program across IT, finance, operations, and legal domains. The RSA Archer platform is engineered to help enterprises easily manage risks, demonstrate compliance, and automate business processes, and gain visibility into corporate risk and security controls. Amit Yoran adds: “Visibility into risk and assured compliance are fundamental business requirements that can truly affect a company’s bottom line. Many of our customers have found that by implementing the RSA Archer platform as a key component in managing their eGRC programs, compliance is no longer a ‘tax’ on the business, but instead can be leveraged as a tool to improve business performance.” Additional Resources: Download a copy of the Forrester Total Economic Impact of RSA Archer IT GRC, April 2012Get more information on the RSA Archer eGRC platformLearn more about Trusted IT from EMCConnect with RSA via Twitter, Facebook, YouTube, LinkedIn and the RSA Speaking of Security Blog and Podcast. About RSA RSA, The Security Division of EMC, is the premier provider of security, risk and compliance management solutions for business acceleration. RSA helps the world's leading organizations solve their most complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding mobile access and collaboration, proving compliance and securing virtual and cloud environments. Combining business-critical controls in identity assurance, encryption & key management, SIEM, Data Loss Prevention, Continuous Network Monitoring, and Fraud Protection with industry leading eGRC capabilities and robust consulting services, RSA brings visibility and trust to millions of user identities, the transactions that they perform and the data that is generated. For more information, please visit www.EMC.com/RSA. ### EMC, Archer and RSA are either registered trademarks or trademarks of EMC Corporation in the United States and/or other countries. All other products and/or services are trademarks of their respective owners. Largest-Ever Wave of EMC Innovation Makes Hybrid Cloud Transformation a Reality 2012-05-22T03:16:00Z largest-ever-wave-of-emc-innovation-makes-hybrid-cloud-transformation-a-reality EMC World 2012—LAS VEGAS—May 21, 2012 News Summary EMC today introduced its largest-ever wave of new transformative products and technologies—42 in total—to a record 13,000-plus EMC World attendees.Today’s announcements extend EMC’s leadership in two of the most transformative trends in IT history—Cloud and Big Data— and make it easier and faster for customers to benefit from the shift to Hybrid Cloud computing with data at its core.The sweeping refresh spans key products across EMC’s entire storage, backup, virtualization and management portfolio.EMC’s market-leading information infrastructure portfolio is uniquely arming customers to drive down the costs associated with managing data in the infrastructure while also implementing more agile IT environments.Through heightened agility, customers are able to invest more resources in advancing their business—versus “keeping the lights on”—and IT can become more responsive to business needs. Follow EMC World Online Online: To track the latest EMC World 2012 happenings and view live general session streaming videos, visit www.emcworld.comEMC Community Network: To view live streaming of keynote presentations, visit https://community.emc.com/community/connectTwitter: For continuous EMC World news and event updates, follow EMC on Twitter at @EMCWorld and @EMCCorp and join the conversations using #EMCWorld.Facebook: To view highlight videos, interviews and more, like EMC on FacebookFlickr: View photos of EMC World on Flickr and tag your EMC World photos with “EMC World 2012” EMC Full Story: At EMC World 2012, EMC Corporation (NYSE:EMC) today introduced its largest-ever wave of new transformative products and technologies–42 in total. Today’s announcements mark the company’s most significant single-day launch of new capabilities for customers and partners, delivering a sweeping refresh that spans key products across its entire information storage, backup, virtualization and management portfolio. As a result, EMC is taking IT efficiency and agility to new levels within both traditional and virtualized data centers. Through its market-leading and enhanced information infrastructure portfolio, the company is making it easier for customers to more quickly take advantage of the shift to Hybrid Cloud computing with data at its core, and implement the changes needed as they transform their IT, their business and their talent base. Just over one year ago, EMC announced a portfolio refresh with a wave of record-breaking storage systems, technologies and new capabilities. This reinforced to customers, partners and the market at large EMC’s commitment to product innovation to handle the massive information growth being driven by the two hottest trends in IT—the transition to cloud computing and the management of Big Data. EMC is doing it again today—capitalizing on the company’s sustained aggressive investment in research and development and driving innovation to deliver the world’s broadest, highest-performing and most-efficient and cost-effective portfolio of information storage and related products. New Product and Technology Highlights The new EMC VMAX Family—consisting of the VMAX 10K, VMAX 20K and the VMAX 40K—is a comprehensive lineup of enterprise storage arrays. Complementing the new EMC VMAX Family is a host of new software capabilities that streamline operations and extend the market-proven VMAX to new hosts and applications, while integrating customers’ existing storage assets into an integrated and unified pool of storage resources.EMC is readying the next version of its industry-leading EMC Isilon OneFS scale-out NAS operating system, code named “Mavericks.” File-based, unstructured data represents the fastest-growing component of today’s enterprise data centers. To better support customers as they address the associated issues, OneFS will incorporate new levels of data protection, security, system performance and interoperability. EMC announced new VNX unified storage enhancements that transform the midrange storage market. The new channel-only VNXe3150 delivers 50% more performance and capacity per rack unit. New VNX software lowers the starting price for Flash, delivers single-click application protection, and simplifies management in virtualized environments. In related news, EMC and VMware today extended their partnership to develop, sell and deliver storage analytics for VNX unified storage.New Data Domain and Avamar systems and software transform the backup and recovery landscape and work seamlessly with a broad set of enterprise applications, workloads and processes, allowing customers flexibility and choice in how they attack their most pressing data protection challenges. The new combination of EMC VPLEX™ virtual storage with EMC RecoverPoint™ data protection is defining a new standard for Hybrid Cloud availability and protection. This combination delivers the industry’s first solution to combine active-active data centers with third site disaster recovery protection.EMC introduced a new suite of enhancements to the EMC Atmos Cloud platform that transform the way service providers and enterprises manage Big Data in large, globally-distributed cloud storage environments. EMC also announced new Atmos Cloud Accelerators that make it even easier and faster to move data in and out of Atmos-powered clouds. New EMC DataBridge™ enterprise management tool empowers IT operations teams with “single-pane of glass” management to easily build customizable dashboards for delivering ITaaS. With DataBridge customers will have real-time IT infrastructure management data at their finger-tips. In addition, last week EMC introduced the EMC VMAX Service Provider (VMAX SP), a new platform that is purpose-built to deliver enterprise-class storage to service providers using a simple-to-consume and simple-to-manage approach. Rather than service providers purchasing individual storage, software and service components, then spending time and effort integrating them, they can now buy VMAX SP which is pre-packaged based-on service-level options enabling them to deploy new cloud services. Customer Quotes Dan Hein, Director of Global Information Shared Services at Columbia Sportswear “Beginning in 2009, Columbia Sportswear set out to dramatically transform its IT infrastructure. We are now nearly 100% virtualized—and have a storage infrastructure that efficiently, powerfully and securely allows us to protect and manage our information. As a leading innovator in active outdoor apparel, footwear, accessories and equipment, we—like any innovator from any industry—require the most powerful, flexible, efficient and agile technologies that allow us to focus on our business—developing and delivering new products while delivering the best possible customer satisfaction. For years we’ve relied on EMC technologies to continually improve and evolve our storage infrastructure and VMware virtualized environment. As the leader at the forefront of both cloud and Big Data opportunities, EMC understands Columbia’s IT requirements—and is delivering new technologies that enable Columbia to fully capitalize on the opportunities that cloud and Big Data offer.” Bob Caisley, Chief Information Officer, Singapore Exchange “Singapore Exchange is a leading exchange in Asia Pacific and ranked 7th in the world in market capitalization terms. We believe that we must constantly innovate and improve in order to serve our customers better. Over the past few years, we have made major technology investments including introducing Reach, the world’s fastest trading engine, and opening a world-class co-location and data centre. To ensure we remain competitive as the Asian Gateway, we place strong emphasis on how we manage, protect and handle information. EMC’s technology vision, compelling innovation and strong customer focus have helped us to successfully execute our initiatives in this area. As a result, SGX has been able to meet demanding performance and reliability requirements for information storage, backup, recovery and security. We value EMC’s contribution to our technology transformation journey.” Industry Analyst Quote Steve Duplessie, Founder & Senior Analyst at Enterprise Storage Group “This year’s EMC World isn't just about the sheer volume of announcements—it's about impact all over the portfolio. The company, already booming, clearly isn't sitting still—anywhere. It's impressive to say the least.” Executive Quote Pat Gelsinger, President and Chief Operating Officer, EMC Information Infrastructure Products “Throughout the evolution of IT, the data itself has remained the ultimate source of value. We build ‘data centers,’ not application or server centers; but rigid technology constraints effectively forced data to a lower priority. The onset of virtualization, cloud computing and big data analytics, however, have restored data to its rightful place as the center of IT gravity. The shift is swift and irreversible, from dedicated infrastructure silos built around specific applications where data is either locked in a specific application or orbits the periphery, to a data-centric approach to computing. Today’s EMC announcements address this fundamental shift head on and deliver to customers the next wave of technology required as they transform their IT, their business and themselves.” Additional Resources VMAX Enterprise Storage News ReleaseVPLEX Virtual Storage News Release EMC and VMware News Release Unified Storage News Release Isilon News ReleaseBackup & Recovery News ReleaseAtmos News ReleaseDataBridge News Release Connect with EMC via Twitter, Facebook, YouTube, and LinkedIn About EMC EMC Corporation is a global leader in enabling businesses and service providers to transform their operations and deliver IT as a service. Fundamental to this transformation is cloud computing. Through innovative products and services, EMC accelerates the journey to cloud computing, helping IT departments to store, manage, protect and analyze their most valuable asset — information — in a more agile, trusted and cost-efficient way. Additional information about EMC can be found at www.EMC.com. ### EMC, Atmos, Avamar, DataBridge, Data Domain, Isilon, OneFS, RecoverPoint, VMAX, VNX, VNXe and VPLEX are either registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners. This release contains "forward-looking statements" as defined under the Federal Securities Laws. Actual results could differ materially from those projected in the forward-looking statements as a result of certain risk factors, including but not limited to: (i) adverse changes in general economic or market conditions; (ii) delays or reductions in information technology spending; (iii) the relative and varying rates of product price and component cost declines and the volume and mixture of product and services revenues; (iv) competitive factors, including but not limited to pricing pressures and new product introductions; (v) component and product quality and availability; (vi) fluctuations in VMware, Inc.'s operating results and risks associated with trading of VMware stock; (vii) the transition to new products, the uncertainty of customer acceptance of new product offerings and rapid technological and market change; (viii) risks associated with managing the growth of our business, including risks associated with acquisitions and investments and the challenges and costs of integration, restructuring and achieving anticipated synergies; (ix) the ability to attract and retain highly qualified employees; (x) insufficient, excess or obsolete inventory; (xi) fluctuating currency exchange rates; (xii) threats and other disruptions to our secure data centers or networks; (xiii) our ability to protect our proprietary technology; (xiv) war or acts of terrorism; and (xv) other one-time events and other important factors disclosed previously and from time to time in EMC's filings with the U.S. Securities and Exchange Commission. EMC disclaims any obligation to update any such forward-looking statements after the date of this release. 81% of Businesses in Asia Pacific and Japan Might Not be Able to Recover Lost Data and Systems 2012-05-08T00:51:00Z 81-of-businesses-in-asia-pacific-and-japan-might-not-be-able-to-recover-lost-data-and-systems Singapore – May 8th, 2012 News Summary: 81% of organisations are not very confident that they can fully recover after a disaster, according to a new survey of 2,500 companies in Asia Pacific and Japan71% surveyed have lost data and/or suffered systems downtime in the last year Hardware failure (60%), data corruption (49%) and loss of power (44%) were cited as the primary causes of data loss and downtime42% of organisations cite loss of employee productivity as the most likely consequence of data loss and downtime44% of organisations who store a backup copy offsite for disaster recovery still use tape for recovery, and 37% still use CD ROM (although 62% now use disk-based storage) 83% of these organisations want to replace tape all together, highlighting the need for next generation backup and recovery Full Story: EMC Corporation (NYSE: EMC) today announced results of ‘The Disaster Recovery Survey 2012: Asia Pacific and Japan’, which found that 81% of companies in this region are not very confident that they can fully recover systems or data in the event of a disaster, and that 71% of all organisations lost data or suffered systems downtime in the last 12 months. These findings highlight the need for backup transformation from antiquated technologies that are not suited for today’s data growth or availability expectations. A move to next-generation backup and recovery solutions ensure continued business operations in the event of a natural disaster, malicious activity or more routine and common disruptions to IT systems. In fact, the research has shown that the causes of systems downtime are often the commonplace disruptions to IT, such as hardware failure or data corruption, rather than natural disasters or other major incidents. Commissioned by EMC and conducted by independent research company Vanson Bourne ‘The Disaster Recovery Survey 2012: Asia Pacific and Japan’ looks at the state of backup and disaster recovery in the region to understand how well companies are prepared for data loss and systems downtime. Survey Findings: Disruption happens: downtime and data loss more likely from an IT problem than a natural disaster The research showed that it is not the extraordinary that creates problems, and it can take just a little to cause a lot of disruption, even something as simple as data corruption. The three most common causes of data loss and downtime are: 1. Hardware failure: 60% 2. Data corruption: 49% 3. Loss of power: 44% This compares to just 20% of respondents citing natural disasters as a cause of systems downtime or data loss, and 17% of respondents attributing systems downtime or data loss to employee sabotage. Regardless of the cause, 60% of organisations reviewed and changed their procedures for backup and recovery in response to an incident. Furthermore, 51% of businesses increased their spending on backup and recovery after a disaster. This is against a backdrop where 31% of organisations surveyed did not feel they were spending enough on backup and recovery. On average, the research found that businesses across the region are spending 10.48% of their IT budgets on backup and recovery. Economic impacts: Lost revenue attributed to systems downtime The study identified that there are measureable business impacts from systems downtime, with the top three cited as: 1. Loss of employee productivity: 42% 2. Loss of revenue: 40% 3. Delay in product/service development: 39% Systems failure resulted on average in two lost working days for the businesses in the survey. Based on an average eight hour working day, this is the equivalent of 32,000 man-hours for a company employing approximately 2,000 employees. Additionally, each organisation lost an average of 484GB of data during a 12 month period. Given that 1MB of data is approximately the equivalent of 25 email documents in size, losing 484GB of data would be the equivalent of losing 12.1 million emails. Despite loss of revenue being rated as a major consequence of systems downtime, the research also revealed that many companies are not doing enough to protect essential customer data. 61% of organisations do not have a disaster recovery plan for their CRM systems, while only 27% of organisations who do have a disaster recovery plan for their applications would require their CRM applications to be up and running first following systems downtime. Furthermore, businesses in Asia Pacific and Japan are failing to take advantage of insurance premium benefits that a comprehensive disaster recovery plan can engender. 55% of companies across the region are obliged by either insurance policies or regulatory requirements to have a disaster recovery plan in place. More importantly, however, 39% of the organisations surveyed are offered reduced premiums by their insurance provider according to the strength of their IT systems backup/disaster recovery strategy. However, 33% of organisations do not know if their insurance provider offers such reduced premiums – or they had never considered it at all – highlighting a missed opportunity for many businesses. Outdated solutions: 44% still depend on tape and 37% still use CD Rom for backup and recovery, but this looks set to change For backup and disaster recovery purposes, 44% of organisations still rely on tape. Looking at the operational cost associated with tape, organisations in the region spend on average more than $58,821 USD including transportation, storage, test and replacement of tape for the purposes of offsite disaster recovery. Meanwhile, 37% of companies rely on outdated CD-ROM for backup storage. Surprisingly, 14% of organisations have an employee take a copy of their backup home with them for safekeeping. However, 62% of businesses in the region are already using modern disk-based backup and recovery solutions. This trend looks set to increase, with 83% of tape-using organisations looking to move beyond tape. The top three reasons cited for this planned move are: 1. Faster backups: 38% 2. Speed of data recovery and system restores: 35% 3. Durability (disk-based methods have a longer lifespan): 28% Preparedness for routine disruption or more significant incidents starts with a next-generation backup approach that leverages disk with data deduplication and network based replication technologies. The survey shows the reaction after disruption is to spend more on backup and recovery, but the damage is done in terms of time and money during a downtime as well as longer term damage to customer loyalty. By raising the visibility of the most common problems facing companies today and the associated economic consequences, organisations can proactively review their own strategies for backup and recovery to ensure they can meet business requirements. Quotes Aakash Gandhi, Chief Technology Officer, Infoplex “This research raises a number of interesting issues around backup and recovery, not least that businesses need to take a proactive approach to ensuring their systems can cope well before an incident occurs. From our own experiences, it seems clear that a next-generation disk-based approach to backup and recovery is best placed to get business-critical applications up and running immediately, so that the economic impact such events have are minimised. By careful planning and ensuring we make the right investments, we are confident that we are well prepared for systems downtime, whatever the cause.” Shane Moore, Director Backup and Recovery System, EMC “Asia Pacific and Japan, along with the rest of the world, is facing uncertain economic times. Against this backdrop, it is more important than ever for businesses to ensure that they are protected against systems downtime and data loss or they are to withstand the damaging effects of loss of productivity and revenue. By establishing a well thought-out and strategic approach to backup and recovery that utilises the next-generation solutions available today, businesses can withstand the consequences of day-to-day outages as well as more serious incidents, while reducing the total cost of ownership of their backup systems.” Country Focus Australia Focusing on Australia, the research revealed that 70% of companies in this country are not fully confident that they can recover systems/data following downtime. In fact, 72% of Australian organisations have experienced data loss or downtime in the past 12 months, with 62% of respondents to have experienced this citing hardware failure as the leading cause. Where data loss or downtime had been experienced, 49% of companies recorded a loss of employee productivity as a major consequence. Additionally, while 58% of organisations in Australia are still using tape for backup and recovery, 61% currently use disk-based systems and 84% of tape users would like to move beyond tape for backup purposes. Japan Focusing on Japan, the research revealed that 89% of companies in this country are not fully confident that they can recover systems/data following downtime. In fact, 50% of Japanese organisations have experienced data loss or downtime in the past 12 months, with 55% of respondents to have experienced this citing hardware failure as the leading cause. Where data loss or downtime had been experienced, 38% of companies recorded a loss of employee productivity as a major consequence. Additionally, while 58% of organizations in Japan are still using tape for backup and recovery, 66% currently use disk-based systems and 68% of tape users would like to move beyond tape for backup purposes. Korea Focusing on Korea, the research revealed that 93% of companies in this country are not fully confident that they can recover systems/data following downtime. In fact, 55% of Korean organisations have experienced data loss or downtime in the past 12 months, with 55% of respondents to have experienced this citing hardware failure as the leading cause. Where data loss or downtime had been experienced, 42% of companies recorded a loss of employee productivity as a major consequence. Additionally, while 38% of organisations in Korea are still using tape for backup and recovery, 61% currently use disk-based systems and 92% of tape users would like to move beyond tape for backup purposes. China (Greater) Focusing on China, the research revealed that 74% of companies in this country are not fully confident that they can recover systems/data following downtime. In fact, 85% of Chinese organizations have experienced data loss or downtime in the past 12 months, with 80% of respondents to have experienced this citing hardware failure as the leading cause. Where data loss or downtime had been experienced, 48% of companies recorded a loss of employee productivity as a major consequence. Additionally, while 32% of organisations in China are still using tape for backup and recovery, 64% currently use disk-based systems and 99% of tape users would like to move beyond tape for backup purposes. India Focusing on India, the research revealed that 72% of companies in this country are not fully confident that they can recover systems/data following downtime. In fact, 80% of Indian organizations have experienced data loss or downtime in the past 12 months, with 65% of respondents to have experienced this citing data corruption as the leading cause. Where data loss or downtime had been experienced, 48% of companies recorded a loss of employee productivity as a major consequence. Additionally, while 76% of organisations in India are still using tape for backup and recovery, 72% currently use disk-based systems and 84% of tape users would like to move beyond tape for backup purposes. South East Asia Focusing on South East Asia, the research revealed that 83% of companies in this region are not fully confident that they can recover systems/data following downtime. In fact, 74% of South East Asian organisations have experienced data loss or downtime in the past 12 months, with 60% of respondents to have experienced this citing hardware failure as the leading cause. Where data loss or downtime had been experienced, 39% of companies recorded a loss of employee productivity as a major consequence. Additionally, while 39% of organisations in South East Asia are still using tape for backup and recovery, 59% currently use disk-based systems and 83% of tape users would like to move beyond tape for backup purposes. Survey Methodology For ‘The Disaster Recovery Survey 2012: Asia Pacific and Japan’ – commissioned by EMC, Vanson Bourne interviewed 2,500 IT decision-makers in private and public sector organizations in Australia, China, India, Japan, Korea, Indonesia, Malaysia, The Philippines, Singapore and Thailand. Each organization ranged between 250 and 3000-plus employees and represented a variety of industries including manufacturing, retail, financial services and telecoms, among others. Additional Resources: Link to APJ reportEMC backup and recovery solutions page -ends- About EMC EMC Corporation is a global leader in enabling businesses and service providers to transform their operations and deliver IT as a service. Fundamental to this transformation is cloud computing. Through innovative products and services, EMC accelerates the journey to cloud computing, helping IT departments to store, manage, protect and analyze their most valuable asset — information — in a more agile, trusted and cost-efficient way. Additional information about EMC can be found at www.EMC.com. About Vanson Bourne Vanson Bourne, a specialist research-led consultancy, carries out user research within a technology context. The company interviews senior decision makers from a variety of functions, across a whole range of industries, in organizations from the smallest to the largest, in markets around the globe. Vanson Bourne's clients range from start-ups to well-known companies that need expert guidance, delivering robust and credible research-based analysis.