Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Dell Unveils New Data Protection Appliances

Dell on Tuesday unveiled new EMC PowerProtect appliances and announced improvements to existing data protection and recovery products.

Dell on Tuesday unveiled new EMC PowerProtect appliances and announced improvements to existing data protection and recovery products.

According to data collected by Dell, organizations last year managed, on average, nearly 10 petabytes of data, which represents an increase of 569 percent compared to 2016.Dell EMC PowerProtect DD appliance

The company wants to help organizations secure their vast amounts of data with a new line of Data Domain (DD) storage systems. There are three new Dell EMC PowerProtect DD series physical appliances, including PowerProtect DD9900, DD9400 and DD6900, along with a software-defined appliance in PowerProtect DD Virtual Edition.

Dell says the new appliances can store between 48 TB and 1.25PB of data, and they provide up to 38 percent faster backups and 36 percent faster restoration of data.

The Dell EMC PowerProtect DD series appliances support the company’s Cyber Recovery solution, which should minimize the impact of cyberattacks and enable faster recovery of important systems. Cyber Recovery now also allows organizations to automate the restoration of data from an isolated vault.

The EMC PowerProtect Cyber Recovery solution now also supports the recently launched PowerProtect software, for which Dell this week announced several new data management features and integration with VMware products.

“As the IT landscape continues to shift to accommodate the influx of data, customer data protection and management requirements will increasingly be shaped by hybrid multi-clouds, global data centers and exabyte scale,” said Beth Phalen, president of the Dell EMC Data Protection division at Dell Technologies. “With the new PowerProtect DD Series Appliances and our expanding data protection portfolio, Dell Technologies is redefining the next-generation of data protection capabilities to deliver data management at global scale.”

Related: Critical Flaw Impacts Dell EMC RecoverPoint

Related: Dell Teams With CrowdStrike, Secureworks for New Endpoint Security Offering

Advertisement. Scroll to continue reading.

Related: Dell Patches Remote Code Execution Vulnerability in SupportAssist Client

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

Former DoD CISO Jack Wilmer has been named CEO of defensive and offensive cyber solutions provider SIXGEN.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.