Dell EMC and VMware Announce Joint Development to Offer Best in Class Data Protection Solutions built on PowerProtect


The cloud is changing the data protection landscape and organizations’ IT environments are becoming increasingly hybridized. According to IDC, more than 70% of companies are using multiple cloud environments. In this increasingly diverse IT world, organizations are looking to adopt a data protection strategy that maximizes their existing investments while giving them the flexibility, security, and control to transition from traditional environments to cloud environments built for a dynamic, digital future.

To embrace this, Dell EMC and VMware have joined forces to offer differentiated best in class data protection solutions for customers today and into the future. Today at VMworld, Dell and VMware announced a joint initiative surrounding Dell EMC PowerProtect Data Protection with protection solutions for VMware workloads at the edge, core and cloud. This commitment is also demonstrated by Dell Technologies announcing additions to its fully cloud-enabled Dell EMC Data Protection solutions portfolio that, together with VMware, enables organizations to protect their data as they transition to the cloud.

Dell Technologies Cloud Data Center-as-a-Service Now Backed by Data Protection Solutions and Announcing a New Initiative for Disaster Recovery-as-a-Service

Introduced at Dell Technologies World in April, the Dell Technologies Cloud Data Center-as-a-Service offering, VMware Cloud on Dell EMC, brings the public cloud operating model to any data center, edge location, or leased co-location space. Now available to US customers, this is the first to market VMware “Project Dimension” solution in customer data centers. Dell EMC is also delivering a first to market data protection for VMware Cloud on Dell EMC, allowing organizations to benefit from the added support of key Dell EMC data protection solutions while leveraging Dell Technologies Cloud Data Center-as-a-Service.

As further illustration of this commitment, Dell EMC and VMware have dedicated resources to further drive the development and delivery of Disaster Recovery as a Service for VMware workloads to bring customers greater choice in Disaster Recovery. Initially the companies will collaborate on a new DRaaS solution for VMware Cloud.

PowerProtect Software with Data Protection for Kubernetes

This week at VMworld, Dell EMC will provide an early look at how Dell EMC PowerProtect Software builds on top of project Velero to provide a data protection solution that enables application-consistent backups and restores and that is always available for Kubernetes workloads or disaster recovery environments. Our collaboration with VMware on project Velero demonstrates the data protection innovation driven by Dell EMC and VMware. Velero is an open source tool that can safely back up and restore, perform disaster recovery, and migrate Kubernetes cluster resources and persistent volumes. Dell EMC has joined VMware’s open source efforts to participate in the Velero community and contribute to Velero’s development. A seamless and successful transition from traditional infrastructure to a cloud native environment requires an approach that values contributing to and using open source software.

Dell EMC PowerProtect Software will be discussed during a session on Wednesday, Aug. 28, titled Tech Preview: PowerProtect for Kubernetes: Backup, Recovery & Peace of Mind for IT Ops & Developers. This session will discuss the challenges of modern data protection, specifically around Kubernetes, and how we will help customers transition from traditional, to cloud native infrastructure. This approach values innovation while giving organizations a data protection strategy with choice of consumption and one platform. Our session on Enterprise-Ready Kubernetes: The Path to Cloud Native will include a discussion and demonstration of intrinsic security, high-availability, multi-cloud flexibility, and data protection through the integration of VMware tools, Pivotal tools, and the Dell Technologies Cloud.

Backed by Dell Technologies, a unique family of businesses, Dell EMC and VMware provide the essential infrastructure for organizations to build their digital future. To thrive in today’s increasingly complex IT world, organizations need to rethink their approach to workload protection and cloud environments. Together, Dell EMC and VMware deliver more choice, scalability, and value to organizations looking to deploy consistent hybrid cloud infrastructure with the backup and recovery solutions to ensure full data protection everywhere data lives.

Additional Resources:

Join one of our sessions – Search the VMworld Catalog

  • Data Protection for Service Providers for VCPP
    Colin Durocher – Monday, Aug. 26, 12:15 PM – 12:30 PM
  • Cloud without Chaos: Accelerate your Cloud Adoption with Dell Technologies
    Varun Chhabra – Monday, Aug. 26, 3:30 PM – 4:30 PM
  • Data Protection Solutions for VMware vSAN
    Nestor Dutko, Max Fishman, & Robert Hammond, Monday, Aug. 26, 04:00 PM – 05:00 PM
  • Take IT to the Track! Self-Driving Data Center, Seatbelts Required
    Aaron Chaisson & Brian Lewis – Tuesday, Aug. 27, 11:00 AM – 12:00 PM
  • VMware Cloud on Dell EMC: Technical Overview
    Eric Gray, Alex Zuo, Wednesday, Aug. 28, 2:30 PM – 3:30 PM
  • Enterprise-Ready Kubernetes: Path to Cloud-Native
    Chad Dunn & Bryan Hicks – Wednesday, Aug. 28, 09:30 AM – 10:30 AM
  • Tech Preview: PowerProtect for Kubernetes: Backup, Recovery & Peace of Mind for IT Ops & Developers
    Efri Nattel-Shay – Wednesday, Aug. 28, 12:15 PM – 12:30 PM
Continue Reading
Would you like to read more like this?

Related Posts

How prepared are you to protect your company’s most important asset – its data? Before you answer, consider the facts:

  • Hackers stole nearly 447 million records containing sensitive personal information in 20181
  • Every 60 seconds, $1.1 million is lost to cyberattacks2
  • The average cost of cybercrime for an organization was $13 million in 20183

These statistics are daunting, and the rate at which they continue is proof that organizations are missing something when it comes to security. But rest assured, you can have peace of mind.

Because endpoint security is so complex and constantly evolving, there’s no silver bullet. But it’s important to start at the foundation. While the rest of the PC industry prioritizes security applications and defenses that sit above the PC operating system (OS), Dell Technologies fortifies the device deep within the endpoint, starting below the OS. This is where Dell Technologies sets itself apart, delivering the industry’s most secure PCs – hands down.

How can we make such a bold claim? It’s all in our approach and way we architect a system of security measures, built from the inside out.

Secure the Control Tower

Many security vendors approach security as a layer that sits above the device as software; however, our approach starts at the deepest layer of the device – the BIOS, which acts as the air traffic-control tower, ensuring all the PC hardware works in concert. It’s essentially the king of the chessboard. Protecting the BIOS is critical for all devices because if an attacker gains access to this level of the PC, it’s checkmate my friend, and the infiltrator can do just about anything with the device on the network.

To guard the PC BIOS from tampering and cyberattacks from the inside out, Dell Trusted Devices give customers the ability to choose their recovery options versus a mandatory refresh, a reckless practice that’s often used by others. Think of it this way – if a burglar broke into your house, wouldn’t you want to investigate how the break-in occurred to prevent it from happening again and make sure that criminal is put behind bars so no one else experiences the same crime? Dell helps you sleuth and strengthen your PC, from the foundation up.

Prevent Credential Stealing

User credentials are the skeleton key to the network kingdom, making them highly desirable to attackers. Some organizations store and secure user credentials via software, versus hardware, but this approach leaves important credentials vulnerable. When an attacker compromises a PC and gains access to user credentials, they have broad access to the network and can launch more attacks from within. Credential storage in software opens the door for serious side-channel attacks and other credential theft tactics.

Only Dell provides secure credential storage in an isolated security chip for better credential protection. Dell’s security chip facilitates an authentication “handshake” directly in the hardware so that credentials are never exposed within software.

Block Sophisticated Threats

While security starts within the device from the inside out, cyber threats continue to grow and get more sophisticated. This doesn’t mean you’re forced to layer on piecemeal security solutions and cobble together an approach from multiple vendors. Only Dell Technologies unites hardware security with software and services to help you better protect your business. Here’s how we take our built-in security another step forward:

  • We simplify threat management so organizations can prevent, detect and respond quickly and efficiently to threats, keeping devices free from malware and cyber attacks. Workers can stay productive and free from the disruption a security incident can cause.
  • In the event of a serious security incident, organizations can tap into highly trained incident response specialists from Secureworks for expert support before, during and after a security incident.
  • Encryption software provides the ultimate level of device security by protecting, controlling and monitoring data across any application, device, OS or platform, all without disrupting user productivity.

Shield from Prying Eyes

Companies trust their employees to keep confidential information safe. Every time a worker turns on their PC and accesses information, they create an opportunity for a nearby wandering eye to compromise sensitive data – especially for remote workers, who are growing in number every day.

For a final layer of data privacy, Dell’s built-in privacy screen lets PC users control their screens’ viewing angles to protect sensitive data. With the push of a button, the display’s backlight adjusts for optimal privacy. No longer do you have to worry about wandering eyes in the airport or coffee shop sneaking a glimpse of next year’s product roadmap or your latest bank statement.

Tomorrow brings an ever-evolving universe of threats, and the most effective endpoint security will adapt quickly to defend against the unknown. Dell Technologies’ continued investment in security innovation helps us stay ahead of others – but most importantly – makes our customers the most secure.

1 2018 End-of-Year Data Breach Report from the Identity Theft Resource Center
2 RiskIQ 2018 Evil Internet Minute Report
3Cost of Cybercrime Study 2019

Staying Relevant is Key

After two and a half great years as Vice-President & General Manager of Dell Large Commercial Accounts in Germany, I recently moved to head up Dell Technologies OEM | Embedded … READ MORE

Sanjay Tyagi October 22nd, 2019
Click to Load More
All comments are moderated. Unrelated comments or requests for service will not be published, nor will any content deemed inappropriate, including but not limited to promotional and offensive comments. Please post your technical questions in the Support Forums or for customer service and technical support contact Dell EMC Support.