Skip to Content
58:29 Webinar

Exploring the Multiverse of Modern Data Protection with Pure Storage

For December, if you remember the king of 80’s movie references and 2 time Coffee Break guest extraordinaire Jason Walker, you won’t want to miss this episode with Jason as guest host joined by Chad Monteith (Principal Modern Data Protection Specialist) to discuss Modern Data Protection.
This webinar first aired on 14 December 2022
The first 5 minute(s) of our recorded Webinars are open; however, if you are enjoying them, we’ll ask for a little information to finish watching.
Click to View Transcript
There you go. All right, the doors are open. Now, the most important part is watch the attendee list grow. That's it. Welcome everybody. Yeah. Oh, and, and Andrews. Uh Andrew's attendees are much more prompt than
a typical uh corporate event. That's good. Love it. Every time everybody loves uh having a coffee break in here, you are in the right place. If you're looking for a coffee break, you are in the right place. It is indeed coffee break and no matter what part of the world you're in, it's almost time for a big cup of coffee.
Just make sure you get one with a pure logo on it. We uh it's an, it's a modern data protection takeover today on coffee break. You're used to seeing Andrew Miller. Yeah. Well, Andrew was got to take a vacation. We have a MD P takeover today. Guest hosting. Hopefully he's not watching us from the international travels.
Being too nervous. I get the feeling Mr Miller is nearby. Uh It's great. Maybe we'll get him on chat to, to uh to call out where he's where he's hanging from. We'll get started with the main presentation at the top of the hour. Welcome aboard. And anybody coming in.
You were in the right spot for coffee break that the music play. We got special permission from Andrew uh Chad to use his music over the over the top here. So the official coffee break uh morning kind of morning show theme during the traffic and weather at the top of the hour, he won't let us stray too much from uh from this program. Plenty of uh plenty of irreverence movie references.
Uh Dad jokes. We got them all on the show today for sure. A lot of people sharing their coffee. My uh my coffee preference today is a uh very boring uh mcdonald's Keurig K cup blend with some honey. I tell you, II, I enjoy the blueberry like uh 7-Eleven does blueberry coffee and we'll take
it the packs and just we use a percolator here and um that things going there and uh delicious. That's like camping coffee, man. You gotta, you gotta be in the woods to use a percolator. Is that right? We uh we love using it.
It, it brews, it's so hot just right. Oh, yeah, that temperature is the key brewing coffee. I'm sure everybody has their own uh special thing about coffee in there. But uh that's definitely for me it's a temperature brewing at the right temperature from uh see somebody from Portland, Oregon. You're, you're out there,
you'll have to look out your window and wave at Mount Hood, my old stomping grounds. Hopefully you got a beautiful view of the mountain today. We have, uh, yeah, we got the Rockies covered with you chad and I'm on the east, east coast, uh, in there. Yeah, I mean, I'm watching, I think we're, I think we've hit everywhere from north to south
east to west, everywhere in between me. Right. Right. We will. Uh, yeah, about to crank it up. You're here for a coffee break. You're in the right spot. Uh We will uh get going here little bit. Hey, hey, everybody, everybody get started going through the exciting multiverse,
you know, everything multiverse. I don't know if you saw Chad but they, the Spiderman into the spider verse did a whole thing. Uh did a new, dropped a new trailer there. It was pretty, uh pretty interesting. Yeah, I'm sure all my teenage kids and nieces and nephews are gonna be asking for a trip to,
to go watch that here pretty soon. That's true. I know we, we go, we go see them all, that's for sure. Well, welcome everybody to Coffee Break Break pure storage. Uh I am your guest host. We're doing an eighties style today.
You know, you got an eighties reference machine. Uh with me, you got Chad who's got the eighties background uh in there and we're both part of the modern data protection team and uh it's an MD P takeover today on Coffee Break. We've got the whole MD P team sitting on the, uh, Q in the Q and A booth. Uh, they, they're, they're well caffeinated, they're ready to go a,
as our, uh, chat. And so we're gonna explore the multiverse of, uh, modern data, uh protection here. And, uh, you know, it's, um, you know, so if you've joined and you expect to see Andrew Miller as well, you should. Mr Miller is the staple of coffee break. We actually got to take a vacation. Chad, you know,
December got to got to take a, take a vacation well earned because he has done a tonn of coffee breaks uh out there. And um you know, this month, uh we're doing the guest hosting but uh Andrew will be back next month to resume coffee break. And if you know, if you say, hey, you know what, I, I would like to see some of those old coffee breaks or,
I mean, if you're glutting for punishment to go back and watch today's again when it gets on, you can go to uh pure storage dot com uh events as you see on here and uh coffee breaks here, you'll see all the old coffee breaks on demand as well as some of our other uh regular series, Flash crew Tech talks, uh engage series uh Chad and I participated in some of those uh as well. Feel free uh to take a look when you drill in,
take, you can go see some of your other ones there. Now, thank you for joining us today. Glad you're here here, live with us. And, uh, you know, and Chad, uh, you talked about coffee in the, in the, in the pre show. If you want to call it that the, the not so exclusive, uh,
preliminary show, talking about coffee. Everybody loves coffee and everybody that, uh, joins us today, you'll, you'll get your coffee, uh, there no, later than tomorrow you'll get, uh, something from, uh, the email address that's posted there, uh, with the subject line and show the Starbucks coffee gift. It's real, it's real.
It's for participating in today's event. Uh, if you don't see it, double check the Pesky spam filter chad, you know, you have to get into the spam filter sometimes and, and dig out real, uh, real stuff. Has that happened to you at all? No, I, I always told my spam filter stuff, I can just auto delete but, uh, that doesn't always work, you know.
So, but I'll, I'll attest this, uh, this gift card does work. If you've never tried it before, you can load it in and get yourself. Uh, well, nowadays, probably one Starbucks or, you know, maybe a Starbucks and a cookie. Yeah. Absolutely. Yeah. Yeah, absolutely. And, you know, and even though it's an MVP
takeover today and we'll go through the multiverse of modern data protection and, and, uh, you know, everything that goes into that uh Mr Miller, Andrew Miller will be back next month uh in January with Brian Gold. This is gonna be a sensational session on better science. Uh tremendous conversation. Uh The, the one part that Brian Gold did
earlier talked about quantum technologies. I'm a big fan of quantum technologies and um you know, Andrew and and Brian will be doing that there next month. But this month it's, it's me and Chad. Yeah. And uh well, you know, like I said MD P take over modern data protection. I am a principal, modern data protection specialist.
Uh team lead. I've been, you know, doing that. I, I started as an admin like everybody else I think and then in, in through the channel and then uh started uh my glorious backup career, Chad many, many, many whiskers ago, uh different colors uh back then. But um uh you know, over 20 years of experience pri primarily in backup before joining pure
storage uh with rapid restore and everything else uh in their chat. But Andrew likes to say uh that I'm the, the king of eighties references when we've done coffee breaks together as with me as a guest, we typically slide in a number of movie references. Uh And there would be ironic if uh if I didn't do one at all on the show. Uh But uh yeah, and that,
so we, we have with our first poll question and uh we'll see that poll question pop up here. And that poll question is, uh, what your eighties movie or if you're not a child of the eighties, what movies do you find yourself most quoting? I mean, I'm a, you know, II, I think that 50% of my dialogue comes from quoting TV series, uh, and movies. We've got some of the, I know regular ones
there kind of, uh, uh, queued up and, uh, I see. Oh, they had some very enthusiastic voting to get started here uh on there. Um uh And then, and like I say, drop the other ones in into there because I got back to the future. Of course, spaceballs, great eighties, uh uh quotable materials, flatch, of course.
Uh I am a big fan of flatch as far as you know. And um and that's it chad, what, what do you, what do you find yourself most kind of quoting from uh movies on our list? Uh You know, I'd be, I'd be voting for Princess Bride out of that list, but, but I saw a good war games reference in our chat here that uh you know,
war games as a, as a lot of great ones too. I, when I'm troubleshooting some stuff, I, I will often say to myself how about a nice game of chess? So, yeah, I did. Uh sometimes the only thing in troubleshooting a game is not to, not to play there. All right, we can close.
Uh Thanks for your Thanks for your voting here. We can close the polls uh on there. And, uh, you know, Ghostbusters, uh out there, uh, it was, uh, the big, big winner there. But, uh, you know, Chad, you, you've already shared that you, uh enjoy the Princess Bride, which I do too. Uh, you know, uh Mango Montoya and every
everybody else. Great. What a great movie, Billy Crystal uh, in there. But, uh, tell them, tell the people a little bit about Chad Monte. Absolutely, some great ones. Well, you know, after I spent uh a rather short stint early in my career in, in industry, uh I, I made it fairly quickly to the, to the,
to the vendor side of the world. Uh focused a lot on as object storage. Um Built a lot of really interesting applications with uh with object storage. You know, if you're out there utilizing service providers or cloud DVR or things like that, chances are, uh you're, you're touching something I had a hand in, in building from a product and a and, and a software perspective.
Um But a lot of that turned into some interesting things around data protection and, and cloud technologies and I found my way through uh to pure, through an acquisition. Uh It's been a really interesting, a really interesting run with a lot of really neat projects that uh uh that we've built and I'm glad to be here. But II I will say um I did try to join the
Jason Walker Club in the middle of COVID and grow myself a good healthy beard. Oh, yeah, that's right. I've got some great photos if anybody's interested. II, I personally got a kick out of it. But, uh, you know, all, all the ladies in my life from my, my wife to my daughters,
to my nieces, um, all resoundingly gave me a thumbs down on that and, uh, assisted the removal of the beard. So, uh, iii I took their advice and now I'm back to the, the beard, this chat, classic Monte. Now, I think, uh, that we're seeing there. All right.
Well, that's great. We're, uh, we are gonna tackle the multiverse of modern data protection and, and doing that. It's a little bit of a, of a fun agenda in there. But, you know, we're gonna, 1st, 1st of all, uh, the elephant in the room is, hey, what, what do you all mean by modern data protection?
So we, we definitely dig into that fact. We got all, like I said, it's an MD P takeover. Uh, here on coffee break today, you got that, uh, Chad and I on camera and then the rest of the team filling your Q and A and Q and A will be interactive. So if we're talking about something that, you know, movie related or not,
I mean, hey, we're not, we're, it's kind of an A ma type of situation here feel free to ask the questions in the Q and A, uh, in there as you go and, uh, our team is ready, uh, to answer, we'll talk about what is modern data protection. Um And then, uh, you know, Chad, we, you and I, we've seen a lot of, uh, a lot of data protection over the years said, oh,
you know, over 25 years for me, uh, we got plenty of stories. So, you know, it's a holiday season chad, you got a couple of stories to tell as we go along here. Oh, it wouldn't be coffee and hot chocolate with, uh, without stories and just talking about how, how data protection has changed. You know, I,
you know, it's, it's interesting in our careers, you know, that, you know, back at the beginning, everybody was focusing on development and intellectual property and the, the software patents on, on how fast can we back data up. You know, let's, uh, let's get that compliance check, check box done.
But, uh, you know, nowadays, you know, I, I would just had a customer, I traveled to them about a month ago. Uh, and, uh, their executive, their, their team, their board was expressing frustration because they'd actually been attacked, uh, with ransomware and they had these backups and, um, the, the key to them is that, that attack actually stole something like 40 or 50
terabytes worth of data that was exfil traded. Um, and they couldn't get their, their system back up. And, you know, ultimately that resulted into a lot of uh solutions that we're gonna talk about here. But that really highlights the problem that people are facing now is the backup is just not, not good enough.
You've got to be able to utilize that this customer that was losing many millions of dollars in revenue per hour and lost revenue through this outage. And their problem is now, I don't need to just back up the data, but I've got to be able to restore it as fast as possible so I can start that multimillion dollar an hour uh revenue stream generating again in my manufacturing plants.
So, you know, really interesting changes that we've seen over the, over the decades. Um Yeah, I mean, a absolutely, you know, we've uh we talk about data protection, we're gonna talk about something called the continuum of modern data protection. And Chad uh Chad's got a great little uh build out that'll talk to that. And also, uh finally,
before we uh before we head out some basic tenants, what uh we call the five ss of uh modern data protection? We'll talk about that, but modern data protection can mean a lot of different things here. So here's our next poll question. Uh That's on the board here. What do you think of first when you think of
modern data protection and, and, and you know, high availability disaster recovery? Uh You know, my, my old, uh, you know, hammer and nails, the backup and recovery part of it, data security. Uh, we didn't put another on there. But if you've got something else that you think of, if you think marshmallows feel free to put marshmallows in the,
in the chat, I think you'll, I think you may be call telling yourself, uh, telling on yourself a little bit there if you do that. But, uh, you know, and, and going through and, uh, you know, talk, talk about that in there and we'll keep that open for a little bit, some great answers coming in. You must be channeling,
uh, the stay puffed marshmallow man. Now, here, Jason, that's right. Oh, see, yeah, Ghostbusters reference. That's right. See it, Ghostbusters was the winner and something like that as people are voting. Uh, you know, it brings to mind a classic, uh Dilbert cartoon.
This is funny chat this back in 2000 even, uh in there. And, uh, you know, uh talking about disaster recovery plans, I think some of us feel like we have something similar to that at least a 2000 version uh, of that going on right now. And of course, no matter what it is, it's, it's probably not budgeted uh in there. Uh, classic,
classic bit there. All right, we're gonna go ahead and close the poll and, um, we will just be telling us that business doesn't change as much as we think. It does. Right. Probably everything old is new again. Great. That's good news for me. Uh, in there.
Uh, in, in there. All right. Well, as we take a look at the results. Wow. Ha. See, Chad, that's what we're talking about right here. Uh When you think of modern data protection, look how spread out that is. Uh on there, we've got backup and recovery, data security, uh, disaster recovery, high availability and,
uh, you know, here's the spoiler. Uh I think everybody's right. I think everybody's right uh in there, it's really um kind of a blend of, of everything to achieve whatever goals and outcomes that you need for your business. And like you said, Chad as, as much as things have changed uh from a technology standpoint,
I think some of those things still, all four of those obviously have, have been important, are still important uh in there. And it really gets us into what we're talking about here when we say um what's modern data protection here here again, a reminder. Uh you put your Q and A uh do your question and answers in the Q and A bin or crack staff, not on crack staff,
but our crack staff of MD P specialists are, are, are waiting to answer your questions in there. And you know, when we take a look at modern data protection scope, like I said, it's, it's everything, it's everything you guys just voted for uh in there and there may be something that pops up top of mind and, and there's events that pop up that get our attention at,
at, you know, right off the bat, some, some fire or something like that, some event that takes place that gets us focused on talking about one of these. But really chad modern data protection scope uh is all this and it starts with business continuity and disaster recovery, doesn't it? Yeah, it does. I mean, you know, the key with,
with modernizing these strategies, you know, business continuity and, and all those technologies, the backup recovery, the ransomware pieces is that you really have to take a much more holistic approach. Uh you know, to these strategies uh and how you want to manage data, you know, the time of saying a backup copy on tape in Iron Mountain,
I is is largely past us there. You know, the the the use cases for that are, are rapidly shrinking if, if many outside of very niche markets uh still exist and that holistic approach that, that we'll talk about here and even in the continuum uh is really key to what is encompassing and what we're defining with modern data protection. Yeah. Uh and you know, it could, could include a,
a ton of different kind of outcomes like you said. So I mean, it uh all of those in, in that column are things that, you know, you and I could talk about all the time when it comes to folks trying to address data protection from the B CD R standpoint there. And of course, our old, my old standby backup and recovery hasn't gone away,
uh, at all. Uh, the, the need for longer RT O type, uh, you know, and a lot further RP OS on, on backup and recovery chat and, you know, in a lot of ways, it's why, you know, we're here, we're here at pure storage right now. Some of the, some of the tenants uh down here, some of the bullet points here and I,
I saw in the chat there was a, a comment about uh testing disaster recovery or at least it, it popped up on my little uh alert here. And I thought, you know, there's, there's another, you know, around the fire story, you know, that we have uh a around, well, multiple customers. But, you know, there's one if, if you want to go back and,
and watch on that list of uh of websites that Jason shared earlier focused on uh accelerate. We actually did an interview uh with a customer, uh where that was a big part of what they were trying to solve. Now, they were solving it, you know, in the context of a ransomware attack and how do you get back? But once they built that they went from not being able to test their dr processes to
testing it quarterly. And previously it took weeks and now they were testing that in about three hours. And my, my favorite quote from the, the, the, the, the storage team there from the, the people that owned that was, they said, well, I, I'm never gonna go to a company again. That doesn't let me test my dr and my ransomware recovery and have it done in less
than a day, you know. So now we've got these things where once, once people are experiencing weeks down to hours, they're like, well, I don't ever want to, to work in a place that's any different than that. So it's neat to see how, how attitudes even of, of the operators are changing in with as we modernize some of these workflows.
Yeah, I mean, it absolutely. And as we do B CD R and we do backup and recovery, like you said, Chad, I mean, it's critical to wrap that in a, put that in a wrapper of data security uh and ransomware. And, you know, we can, we don't have a conversation about one typically without the need to at least address and ask questions about some of those other things.
And then, you know, the and also, you know, how you, how you consume, you know, how, how are, how are you, how do you buy, how are you looking at, at buying solutions, uh holistically kind of moving forward there as well, you know, a lot of time and a lot of times we will get a call to collaborate with a customer on any one of these bullet points, uh our topics and,
you know, at, at, at that point kind of chad and I will, you know, and the whole MD P team like to take the time to stop and ask about some of these other things and if you've got vendors that are talking to you, uh and they're about that, I mean, it's ok to say, what else should we be doing out here? Uh What, what else, what else can we tackle?
Uh And there are there other things that we should be doing and asking questions when you're putting together an RFP or, or anything or, you know, an, you know, an RF I uh ask, ask some of your consultants, ask some of your partners, what am I, what am I leaving out? Because it's an ever change, even though those pillars are the same, it's an ever changing uh kind of discussion.
And really, uh you wanna, you want all these align together for an efficient outcome and that's kind of what we, what we get at. That's why we call this, our, you know, modern data protection scope. And again, you know, like you said, Chad, you, you, you can't, you've been unable to kind of wait to tell some of the stories uh in there. That's great because I can say it,
it's, we're not gonna do, you know, a night before Christmas here uh, but we will tell some data protection stories because we've, uh, you know, we've, we've heard quite a bit. So why don't you kick off with a, with another story chat and we'll get into some story time. Get your warm up. Your coco story time.
Stories are the best part. You know, when I'm, when I'm telling my kids what they want to pay attention to in college, I, I try to remind them, don't ignore your English classes because being able to tell a good story is a lot more important when you get older than, than anybody thought when you were in, in high school or in college,
especially uh you know, uh those of us on more, more technical disciplines. But uh you know, really just talk about how some of these things, you know, how being able to rapidly be store, get fast access to your backup data can, can impact other sides of the business. You know, I was working in the, in the last year with,
with one customer that has uh a substantial amount of database. And then we're talking about hundreds, if not thousands of databases that they're utilizing as part of their uh telecom uh operation. And they've got a lot of developers that are always working on that data set. Now, they came to us says that, hey, we need to facilitate rapid restore and ransom protection
and, and we solved that problem. But what was interesting uh uh as a corollary to what they were able to solve is that they had dozens of developers that were continuously taking copies of those production databases uh that were running on our infrastructure and needing to refresh the data, run new models, run new uh queries, modify their application and do some tests on that and,
and the productivity of those developers because they were able to repurpose some of these uh these backup and rapid restore solutions. Were that a refresh of a developer environment went from a process of about two days to a process of about one hour uh in order to refresh that uh and their business, you know, their developers being able to say, hey, I can get faster access to new data and
not spend all this time, just, you know, waiting for etl processes to complete um was was pretty impactful to their business. And, and just one of those additional value adds that you get when, when you solve problems around, how do, how do I fix the the root problem which is how do I recover from ransomware and attack or disaster as fast as possible?
Well, you can repurpose that get more value out of that and, and we've got people that are, that are doing that uh demonstrably out out there. So the, the another another story that I love. Yeah, I mean, I I know and we've seen them all, not all are very, you know, happy stories chat. I remember I was talking to a government agency
and, and, uh, just kind of relating to this admin because we've all been there, we've all been admins, uh, in, in there and, you know, he was walking in every day and there were new slas being foisted upon them. They were, you know, you know, the, the criteria is you need your data, you know, you, your, your internal customers need data,
uh any time anywhere from anything, you don't lose any, uh you know, they need to have stuff back uh in a hurry. Oh, protect this from all the uh all the outside forces that want to do harm to the data. And uh you know, then your bosses want to keep it, keep costs in line. And he, we were talking about some of the modern data protection solutions and uh he just
had a look on his face and, you know, he was locked into legacy contracts and he knew the good that he ought to do with, with his. And he just, you know, he felt trapped and uh and imprisoned by, you know, what he was currently tied down to, didn't feel like he could even move off uh for, you know, 12, 24 months. So he had to keep kind of trying to aim ahead.
And at least, you know, when we were talking to him, he felt like he could start to get kind of ahead of things. By going uh and, and just fasting and pure. But it, it called to mind that with all the technology and everything else that changes, being able to be flexible in your uh you know, trying to be as flexible as possible with your technology. Uh is that, and we starting to see that chad,
you know, with the, we started to see that with some of the buying measures that folks are doing, you know, as a service stuff is, you know, definitely come into vogue more and operational trying to clear some of those hurdles and, and uh so we're asking here in poll number three, you know, what's the biggest hurdle right now between you and your data protection goals today?
I mentioned, you know, let loaded question. I just said, let you have some legacy contracts uh in there. We've got, you know, we've got old architecture uh uh not performing things slas are moving so fast. Uh Chad, especially around restore that, you know, a lot of architecture are having a hard time keeping up uh with that. Uh You uh you mentioned right at the beginning
about process and plans, uh security plans, hygiene uh in there. And uh you know, there's gotta be others budget. That's great. Yeah, of course, other budget, I think if I put budget on here, it would have gone to 100%. Uh But uh that's definitely always there, uh always there for sure.
Uh As, as Uh, well, in there, um, it's good. We're gonna, we'll let that roll. I think a little bit before we close that down. Feel free to keep putting stuff in as you think about your, uh, hurdles and, um, you know, we'll move on to, you know, something that's, uh, you know, there's that, this, it was kind of interesting.
I watched the, the poll and, and how it, the numbers changed, like what people quickly pushed on really quick, like what started like a, like a fast, oh, it's that really fast. And then the ones that people thought about, uh you know, a little bit and the old architecture one that's kind of stayed fairly consistent on that number. But what was funny is that was watching the
Legacy Contracts one, it started, like, people hit that really fast as a, as a pain point and it went down, it kind of came back up but it's interesting in polls like this, how we should, you know, what, what should we learn from them? You know, and I wonder if legacy contracts, if, you know, if, if we're writing, you know, or if there's an issue in the industry where people are
writing contracts, sorry, if they're writing contracts that are, that are too long, you know, maybe we should be thinking about how, how long we're engaging in those uh in those contractual obligations with, to, to increase flexibility. I don't know, just kind of an interesting observation with that. But let me, let me, let you move on to the
continuum here. No, that's it. No, I mean, I, you're, you're, you're absolutely right. And that's why I say some of the other buying methods have come into vogue because of that, some more flexible uh type of solutions. Uh You know what I would say, easy to hire, easy to fire as a, as a, as a service contracts,
uh can, can aid in that a little bit and maybe even as a uh I think they need to uh get back in place there. Yeah. So, you know, we, we kind of mentioned, you know, we, we looked through the really quick at the, the pillars, business content, dr backup recovery, uh data security runs some ware chat. It'd be, we'd be remiss if we didn't say, say that, hey,
you know what pure storage has a, a few things around uh some of that and, you know, certainly, certainly we do uh around MVP, talk about them, uh you know, all the time, you know, chad snapshots backups, things of that nature. Right. Mhm. Yeah, I mean, all these technologies and we talk as part of the continuum,
I mean, all all all of these features, you know, that you get with pr or, or other vendors play a role in a modern data protection strategy and in fulfilling the needs of the continuum uh of data protection. That's right. And, you know, so we can see it like this, that's fine. Sometimes it's easier though chad to see it in
a different context, right? Uh So the MVP team at pure storage is proud to present to you the continuum of modern data protection. Oh, man. Now, I, now I'm really in the eighties. What I, what I love about presenting it this way is,
is, is it's got a visual aspect to it and I know, you know, as engineers, we like to talk a lot, we do, we do things in uh you know, writing and verbally. But, you know, uh a lot of us, you know, understand things visually as well. It's just, it's, it's just the way humans understand things, you know,
I, I spend a lot of time with the kids and helping them learn things. It's like, how do you learn things where you read it, you write it, you hear it, you say it, you know, and, and all those modes are, are important. And so when we talk about, you know, the continuum here, really, what we're trying to do is map a business requirement,
the sl a to an individual technology because anything that we're asked to build as engineers is gonna have an sl a associated with it. It's gonna be something coming from a business owner, uh an executive uh maybe the board of directors, that's saying, hey, this application, this infrastructure, you know, it really needs to always be available it needs to be nonstop or, you know, maybe if, if we're down for half an hour,
it's not so big of a deal so pure has technologies that fit all of these different sl a definitions. Now, this, I would think about, you know, to everybody on here, we've got well over 1500 people on this call here uh on this webinar, I would really think about this regardless uh of who the storage provider is and really think of it as how do I map strategically slas to different technologies?
You may not have a lot of peer in your environment, but other vendors are gonna have similar technologies that you can work with and integrate as well. And when you're looking for that tightest SL A, so this is the most mission critical nonstop type applications that you want to be running where your recovery point and your recovery time are both zero.
That's where you're looking for technologies that we provide with our flash A AX with a technology like active cluster, synchronous metropolitan area, data replication and service availability where your applications don't care which of that metro data center they're running in. They don't care where they're getting the data from you're able to maintain in the event of outages or disasters that 00 RPL RT L.
But that doesn't fit every application sometimes one in, in, in every case if you're investing in that uh 00 RPO uh and RT O you also need to address a disaster recovery. So an out of region copy of that data, you want that data to be as near to zero recovery point as possible. Uh and even your recovery time as well. But you know,
it's not going to be zero, gonna be zero. So we implement technologies like active dr where typically, you know, across the US type of distance, you're gonna see something like a 32nd delay with our continuous data protection technology assuming everything's running healthy. But you've got the big red button that says fail over the application to this remote site
and within 30 seconds and I start running it, that's your Dr type of strategy. The next one that we build on top of that comes into utilizing technologies like snapshots. So these are those point in time repli um represent teams of your data that you can use for a lot of purposes. You can use it to recover to, you know, because a snapshot in the event of corruption or loss or anything else is a
metadata only operation that is always invariably going to be your fastest restoration method ever. So when you're looking at that low RPO, maybe it's measured in an hour if you're taking an hourly one. But your RT O being as small as possible, um that's where snapshots are going to come into place. And, and, and the great thing is there's a
whole lot of other functions you can do with these because they're ridable. We see it uh in dr we see it in test DEV uh we see it in application integration Q A lots of great use cases you can use for that. Um But now that we've got things like safe mode or I'm sorry, as a ransomware tax, uh being such a problem that we've got,
we've decided to improve on that snapshot technology with a uh component called safe mode. And what's key about that is that allows you to provide a mutability enforcement, a compliance enforcement on top of your snapshots. So now an api an attacker, uh a human error cannot go destroy the data or destroy the configuration in the U I that you've got on your storage infrastructure.
It's now maintained from a compliance perspective. So you always have the ability to rapidly restore your environment to that point in time from a data set that's not corruptible through mistake, through disaster, through attack, uh through, you know, an API or any of those other functions. And that works across uh our product set as well as our integrations with some of our
backup providers. And then you build on top of that in this sl a definition um with integration with our backup providers. Um and you'll see on here, we talk about, you know, flash recover um with uh with our integration with ED, but this applies to all of our data protection partners con Vault VM Spectrum Protect model
nine. All of, you know, all of those out there that are utilizing any of our, our storage providers for that protected safe. There are, there are so many, I mean, we've uh you know, we've spent years at least since Jason and I started in, in 2018 to, to really build out these integrations.
And there's been a tremendous amount of engineering work that goes into this ecosystem to, to integrate them. I mean, con vat tightly integrated with object safe mode. Uh We be tightly integrated with uh safe mode uh from a file perspective on the back end of that, you know, uh and I'm, I'm gonna segue a little bit here. But you know,
those two technologies really provide something unique when you can tie it an immutable rapid restore enabled component with uh with a backup application that puts data and metadata in that protected layer. And what that allows you to do is re instantiate your entire backup environment to a known good point time where then you can, where then you can start doing rapid restore,
instant recovery, live amounts of those really interesting application use cases. But what we've been demonstrating with our partners is that you can do that restore. And about now everybody here, if you're knowing data protection and you've been around for any period of time, you're probably thinking, wow, if my data protection environment was corrupted, there's no way I'm bringing it back in 30 minutes.
But that's what we've enabled here with uh with our data protection partners in the safe mode. So back to the sl A part when you want to restore, measured in hours or tens of minutes with log with log backups, recovery time and, and measured in potentially minutes, but also hours. Um then that's where these technologies really come into play again, get from the business, what your SL A is choose the right technology
uh in order to implement on top of that. And then for the longest slas more, hey, we need to retain it for a long period of time. All of these vendors, all of these technologies have the ability to write long term copies, uh archive copies uh to a public cloud, you know, from a security from a compliance um from a copy of last resort if you will, you know, it's great to write cloud copies for long term
retention, put object lock on there, put compliance enforcement. That is my absolute copy of last resort compliance copy out there. All of that building our continuum of data protection and availability based on an SL A we're delivering on this innovation across all of our partners and across technologies and features that are included and pure as well. So you can mix and match this based on what
you've got uh an environment as well. That's right. It's not a one size fits all you don't have to do snapshots for everything you don't have to streaming back up everything. You don't have to do everything, everything you can be intentional and should be intentional about your level of data resiliency and this continuum and,
and the pillars or whatever is easiest for you to get the picture, you know, tell, helps illustrate the options that you have and the kind of conversations that I know we have every day with uh with customers about what's best, you know, let's, let's talk about it. Uh uh you know, et cetera there. All right.
Uh That, that's great. And uh we've already, you know, we finished up a poll three already. But a reminder, you know, all those things that Chad talked about, all the things we talk about in MVP in the continuum are part of those, uh are those hurdles you're trying to overcome uh in your data protection, you know, strategy there. So, you know,
now that, you know, Chad, we've got, uh it's a great scale. I mean, the continuum is a grand scale and clearly and, you know, it could be overwhelming uh to some folks but the enormity of kind of the concepts and, and, you know, we, we talk about being intentional about resi being resilient, but there are some core tenets from no matter what you're doing as a part of your data
protection. There's some core tenants to really be aware of uh out there. Uh you know, the in the universe and in the multiverse of, of MD P. Right. Chad. Yes. Yeah. And those, you know, those those tenants, there's, you know, we've come up um with this conversation around what
we call the five ss of modern data protection and they're really more strategic imperatives um that we want people to be thinking about as you go to solve business problems, as you go to solve those slas focused uh on, on modern data protection and that whole ecosystem around there, these apply across the board. You know whether you're using an on premises technology like pure, you're using a cloud provider, you're using somebody else's provider,
you've got an MSP, it applies, it applies in all of those situations because what these five pillars are that uh that we find people needing to be thinking about um are for the first one is focused on, on speed, that's sort of the crux. Yeah, I mean, that's the crux of, of how modern data needs to be viewed because it's all about the availability of the data, the availability of your business',
intellectual property. I mean that data represents the intellectual property that, that your business has invested in. Whether it's documents an application, a service, customer data, it doesn't really matter. And in today's web-based world, having availability, having access to that data ends up being one of the most critical
definitions uh of whether you're meeting a service level and even whether your customers are happy. So we need to focus on speed, not just in your primary production application, but should anything happen? How fast can we restore that service? So those need to be, that needs to be a key decision point that you're looking at here.
It's, it's not just about keeping things in a lockbox. Chad. It is, it's a if you, if you have something out there and you can't bring it back in that, in, in the, in a reasonable amount of time, what good was it? What did we do that for? We still lost a ton of money. I mean, I mean, imagine a simple use case for everybody.
You go, go get a new iphone and you say, hey, you know, load my out icloud backup. Nobody wants a, a pop up that says, hey, congratulations on buying a new phone. We're gonna restore your tape. Come back in four days to, to install your phone. No, no, no, that's not really viable, you know. So I,
I feel the need, the need for speed. There you go. There's an eight quote right there. Put it on the board, the bring it back, top gun, you know, top gun baby. There you go. So, but even that speed, you know, if you could bring something back, but if you don't have a trust in that data that you're
bringing back, if you can't say it was secure, it was immutable. It was how I wrote it, then there's diminishing value, even maybe no value in being able to bring that back. So we want to make sure as the second pillar that anything that we're doing here, snapshot object or cloud, a backup restore component that it inherently has a property of,
of security and immutability built into it. So you're looking for application stacks that right data immutable. You're looking for appliances that are using things like secure Linux that are utilizing things like role based access control multifactor authentication. Make sure that these principles and these properties exist in here so that you can be assured that when you rapidly restore that data,
that it's good data and it's usable data and that it's gonna meet what you're looking for. And, and as we meet those first two, it's important to also have simplicity built into that as well. A lot of pure customers love, love the simplicity we've brought II I love the story that our first flash array, the installation user guide was on a business card.
You know, that's, that's an ethos that we've really built into. Everything that we've got here is if you can stand something up and, and manage it intuitively, you know, then we've really succeeded there. And that's a, that's a key design imperative that we always take. Um with API first architectures, there's a lot of open source scripts,
you've got to integrate into your workflows from an API perspective. But also to automate things. You know, a lot of our backup applications are automated from a, from a scale and consistency perspective and, and that's pretty solid there as well. Um But all of those first three, you know, in order to be able to address them,
you've got to have a property of scalability as well. And simple scalability uh is important. You know, if, if your business starts needing, I don't know, let's say you need 500 terabytes, but now your business comes and says that needs to be five petabytes. There's diminished value with,
you've got to go rip everything out and replace it and it takes nine months in order to go implement that. And uh you know, there's migrations and professional services. I mean, there's a huge cost to that. But what if we could build and provide systems that say when you go from half a petabyte to five petabytes, it's an online operation.
Your engineers don't need to add storage, we simply add blades and everything seen and your policies automatically take advantage of that. You're done in an hour. There's real value in bringing the ability to do scale from small to massive systems without having to rearchitect or reinvent the system. Uh reinvent things.
I mean, that's really the crux of a lot of the, yeah, the, the disaggregated architectures that we built. What's that? No, I just say, you know, I think a lot of folks and I, and people in chat have been saying it scale is often overlooked. And why is that? Because it's not something you could readily
poc it's not something that you test in there. So you don't consider it as much as maybe some bells and whistles or, or some of the simplicity, I think, you know, a lot of folks concentrate on simplicity and security but the speed and the scale speed at scale like you're talking about Chad often get overlooked. And I agree this is a core tenet.
You have to consider what the scale look like. 50% of your data center, 75% 100% of your data center. What would it take to bring all of that back? It's scale that is critical. Go ahead and hit the last s no, that that's so important. Jason, you know, a ask anybody, you know, consider yourself here on this webinar if I have to bring back 30 50 or 100%
of my data center. How long is that gonna take? And what's it going to look like? That's where scale and simplicity really come into play. But it's important these days, especially, you know, with the the global macroeconomic situations that we're in the sustainability um is considered in all of these solutions.
If you, if you build a solution that has these first four properties, but you have to go build a nuclear reactor next to your data center in order to power it probably diminish the value uh in doing that. But if we can build, I mean, diminished value. But if we can build something that has a fraction of the infrastructure cost,
a fraction of the power cost, I mean, I, you know, one number I love from our new flash plate is, is it reports 1.3 watts per terabytes of power consumption. My laptop here that I'm running this from is probably pulling 60 or 70 watts, you know, just to do this. So enterprise storage, all these features we talk about 1.3 watt per terabyte is is,
is is pretty impressive but really and and, and the point I want to make is we have this is another a little bit of a story seg right here is we had one customer that exemplified why sustainability matters and they had a previous system that was a hyper converged uh stack and it was consuming almost 710 gigabit ports in order to provide that service and didn't even have rapid restore other properties associated with it.
We were able to go in there and rebuild that with these principles. Put in a solution with speed, security scale simplicity. They got a system that was substantially faster with only about 100 10 gig ports associated with that. And when you look at the burden cost of infrastructure, I mean, think of it yourself. How hard is it for you to go procure 610 gig
ports right now. I mean, you may be on a nine or a 12 or a 15 month lead time on that. Plus you've got a racket, power do all of those things associated with getting it up. And now we're saying 1/8 may be less of the infrastructure costs half or less of the power to run it. You know, I mean, this is huge in a lot of our
European uh customers now because the cost of power is so skyrocketed, the cost of infrastructure and delivery is so skyrocketed. This is a critical piece as well. So I would encourage everybody think about these five pillars as you're embarking on architectural choices and into, into modern data protection. Um Because can I assure you they will help you
build a solution that better meets uh the objectives that you're looking for? Um And, and, and really be valuable to you, we can talk about those pillars of uh business continuity as recovery, backup and recovery, ransomware in security. And we can look at the continuum and get a real solid one, but these tenets, these core tenants should be uh in your thought pattern as you as you're
talking about uh all of it there. Great stuff. Chad love the five Ss, love our continuum uh in there. So, you know, as we, you know, kind of going through here, we take a look at the final poll question for here. Now that you've heard everything and you've heard so much in so little time.
You, yeah, I know. It's hard to even fathom how much, uh we've fed, we're asking you the question. What's the next step that you are planning to take? Now? Maybe it was something you planned beforehand. Maybe Chad uh did some wizardry and, uh, you know, maybe I waved my hands and made enough
cultural references to where now you have something else that you want to do. What's the next step you're planning to take in? Uh you know, modern data protection? There it is, you know, um you look around again, I would just want to just call to say a kind of a call to action. Uh What else, what else uh you know,
ask yourself, ask your partners, what else should we be thinking about here? Because it's all hands on deck right now in terms of data security, in terms of, of data rest restoration. Uh everybody is, is really uh you know, modernizing and wanting to know, what else, what else should we do? What aren't we thinking of what?
Because you can't think of everything, Chad, right? I mean, there's no way there's no way to think of everything. So ask, ask a, ask a quote. We're gonna ask questions when we're in, when they were in because there may be things you haven't thought about uh in there as well. But I, I think it's a, it's a good idea, you know, nice thing about uh data protection chad,
it is a continuum but it's also a cycle. We can learn every time an event happens, we can tighten things up. We, we talk about, you know, our, our, our, our customer out at uh at, at our pure accelerate, talking about recovering from a ransomware attack. Talked a lot about how they've improved their regular uh update hygiene.
Uh how they do just not nothing to do with pure but like Windows updates and things like that. Uh update hygiene and how they learned even after the attack, even though they were ready, what could they do better? And some of that comes into forensics. A lot of people aren't thinking about fast forensics. Uh You should, you should think about that
because that, that will help that process. Yeah, it'll tighten up that process and keep it going. So the data protection is a continuum but it's also a cycle. It gives you the opportunity uh to, to let's let's uh let's tighten up a little bit here as well and be more uh you know, uh make it a priority.
That's my, that's my thing. Uh make it a priority. My favorite phrase that you just threw out there. Jason was fast forensics. Well, I like that. I'm gonna have to remember that. Forensics. I love alliteration.
Who doesn't love a liter. We gave you a ton of alliteration on the show today. That is that is how we remember things. That's right. I know that's it there. Uh Oh, good. Uh Good. Uh We'll go ahead and close uh poll number four here and uh kudos to the 46 folks who threw up
their hands and did nothing. That's a person I can relate to as a former admin and haven't worked uh uh in there. Uh Great job. Thanks, you know. Uh thanks uh to, to Chad Monte. Thank Chad, thanks for joining and being my uh my co-host on our,
thank you, my fellow, my fellow principal uh on here. And now, you know, Chad, uh the most exciting part of coffee break for a lot of folks is uh is the drawing. So, you know, we, we put our hands into the imaginary uh bin. They used to do this, they would have things that have been, they'd crank it around and somebody would reach into this bin and pull it
out. Fortunately, Chad, we don't have a bin and uh we don't need to do that electronically is chosen and the winner is Todd R from Holiday, Utah out your way uh out there in the, you know, you're in Colorado, you're just a little small trip down south uh to Utah, but Todd R from Holiday, Utah is the winner of the Ember Raffle.
Now, you know, we've done a lot of yapping about MD P and the MVP takeover is nearly complete here. But don't forget that if you prefer the more sultry tones of Andrew Miller and uh, and the big brain of Brian Gold, they'll be here next month to talk about better science and it will be a better show even than probably this one. This was great.
That one's gonna be even better. So you're not gonna wanna miss it. Uh You could register already hit that little QR code in there. Yeah. No, I know. I, I love Brian's conversations about how we're applying science and physics and, and math to technologies like our, our BF MS and others to really build better products.
In the end. It, it's great insight to how engineering applies to real world stuff. II, I always enjoy hearing from Brian. I I highly recommend it uh the final score from poll four data, resiliency chad with additional data. Just go a labs get intentional. I, I think that there's so many options available to you and uh we love talking to
customers uh about that in part, you know, we love consulting uh and, and chit chatting, shoot, we'll even talk to each other about it. What the heck and uh process review. Yeah, definitely. How can we make things tighter? Ask those questions? What else are we thinking of?
More storage? Hey, well, you know, hey, Chad, you know, pure storage. Uh we like more storage. Uh We want, we want you to be smart about it too. That's why the five SS are are out there as well. All right. So, you know, we're kind of officially,
uh, officially done, formally done. Uh, you know, we've been a, I know that all the Q and A has been, uh, taken care of by the, uh, MD P super squad, uh, in the, in the bullpen there, uh, you know, shipping on, uh, fancy drinks and feed up and while they're answering your questions, I'm sure.
Uh, but, uh, if you have any other other questions, feel free to uh pop them in, check them, check them out. Uh Other than that, you know, uh does anybody have any more questions there? And if not, we will bid you a fond farewell.
We thank everybody for joining us. Uh Chad Monte, the MD P team. Everybody involved thanks to Andrew Miller for letting us uh take over while uh while he's out there on uh on break and um we will see you later. Thank you. Thank you, Jason.
We'll be sticking around but uh for just a little bit longer uh while Q and A comes in. But uh we think you're in there. Yes. Happy holidays to everybody uh out there too. Definitely there. We'll, we'll, we'll hang out for a little bit until uh until some of those simmering questions, get the, get the courage to be asked.
Yeah. Feel free. Pop them in uh to the Q and A out there and um we will uh turn it here, hold on play the gentle coffee break music, uh, on there. Don't get our drive show. Maybe that'll spur some stuff on.
Give it another couple of minutes here to see if the Q and A pops. Anything else in there. We, we might have set, set a record for, uh, for, uh, for comments and chat, trying to scroll through them to find things that was a vigorous, dissipation, for sure. Yes.
Vigorous in their eighties. You know, anytime you start talking about eighties blue, that was some great stuff. Yeah, absolutely. And someone had mentioned Top Gun in there. I'm glad we got to uh we got there in there. All right. Uh Yeah, Timothy page is safe mode. An additional, this is a great what a great question.
Timothy Page is safe mode. An additional purchase. Absolutely not. It comes part and parcel. We kind of take that for granted. Chad, don't we? That all the, all the functionality comes out is just included uh in there. That's what, you know, that's what I've always loved about.
Pure is, you know, all the features are, are, are just included on the era from a licensing perspective. You know, I remember, you know, without calling anybody out, you know, some uh earlier parts of my career where everything was uh was an A la carte charge. Uh And that is, that is not the way with fear. So safe mode is included.
I think I did see a question in there. About what is safe mode and how does it interact with snapshots. Um So they're, they're very complimentary. Uh in fact, safe mode requires snapshots. So a safe mode, snapshot is a snapshot you take with your existing processes,
API script, application driven. But what we add on top of it is compliance enforcement in the uh deletion of it as well as in the, the management and the access and the API and the gooey pieces. So that that cannot be changed, deleted, altered or have the retention changed for the amount of time that you set up at the beginning with the safe mode configuration.
So think of safe mode as compliance configuration, enforcement for your snapshots to ensure that no bad actor or mistake can get rid of them. And that's what we're writing on top of that and everything's included. We'd love to talk to folks more about that every time. Thanks to all those who have commented in the Q and A and in chat.
Uh I think, I think that's it chad. I think that was uh that's all that people needed to have of MD P, the MD P takeover, uh massive success. Everybody's walking away, happy. Everybody's gonna be drinking coffee at least by the end of tomorrow. Uh courtesy of the Starbucks gift card headed their way.
Any, any last words, chat and, and, and the key on any webinars to not overstay your welcome and to wish everybody Merry Christmas and a great New Year. Right? Great, happy holidays, everybody. Thank you very much for attending. We're signing off Andrew Miller back next month with Brian Gold.
Be sure you tune in coffee break or storage.
  • Ransomware
  • Backup & Recovery
  • Coffee Break
  • FlashBlade
  • Enterprise Data Protection
  • FlashArray//C
  • FlashArray//X
  • Business Continuity

Jason Walker

Global Practice Leader - Cyber Resiliency

Chad Monteith

Principal Field Solutions Architect | Pure Storage

Who knew that the best coffee break conversations would end up happening online? Each month, Pure’s Coffee Break series invites experts in technology and business to chat about the themes driving today’s IT agenda - much more ‘podcast’ than ‘webinar’. This is no webinar or training session—it’s a freewheeling conversation that’s as fun as it is informative and the perfect way to break up your day. While we’ll wander into Pure technology, our goal is to educate and entertain rather than sell.

For December, if you remember the king of 80’s movie references and 2 time Coffee Break guest extraordinaire Jason Walker, you won’t want to miss this episode with Jason as guest host joined by Chad Monteith (Principal Modern Data Protection Specialist) to discuss Modern Data Protection.

Now, what is Modern Data Protection, you say? I’m glad you asked!

After first establishing the scope of Modern Data Protection (Business Continuity & Disaster Recovery, Backup/Recovery, Data Security/Ransomware), we’ll continue with an industry perspective and stories from many years of experience before moving into how Pure has unique offerings in this area (the 5 S’s of Modern Data Protection! The Continuum of Modern Data Protection!). For those who were almost English majors, yes, that was indeed a run-on sentence.

More importantly, did you know that a layered approach of data resiliency involving backups, snapshots, replication, and more (tuned to be simple operationally) can provide more than you might expect? Let’s not limit ourselves by what data protection has been in the past - let’s make it Modern!

Continue Watching
We hope you found this preview valuable. To continue watching this video please provide your information below.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Meet with an Expert

Let’s talk. Book a 1:1 meeting with one of our experts to discuss your specific needs.

Questions, Comments?

Have a question or comment about Pure products or certifications?  We’re here to help.

Schedule a Demo

Schedule a live demo and see for yourself how Pure can help transform your data into powerful outcomes. 

Call Sales: 800-976-6494


Pure Storage, Inc.

2555 Augustine Dr.

Santa Clara, CA 95054

800-379-7873 (general info)

Your Browser Is No Longer Supported!

Older browsers often represent security risks. In order to deliver the best possible experience when using our site, please update to any of these latest browsers.