Topic Advisor:Liang Sheng (Xigua brother)

CHO of the public Wechat account "high-end storage knowledge" , this We Media number was founded in June 2013, is committed to popularizing storage knowledge. In the past 5 years, Xigua brother has published more than 1,000 articles, attracting nearly 50,000 storage professional readers, and has extensive influence in the storage industry. He has been invited to give speeches at the China Storage Summit and China Flash Summit for many years. “The high-end storage knowledge” was also invited as special media of China Cloud Computing Conference

Topic: Storage New Trend - Secondary Storage

The secondary storage is actually not a new thing, but why has it become a hot spot for investment in the near future? There are currently eight unicorn companies, five of which are secondary storage companies; Gartner's team of backup analysts have also resigned and joined the secondary storage vendors. If you are also surprised, let's take a look at the reasons behind the huge changes in the secondary storage market and some of the innovative ideas of the emerging secondary storage company.

Audience benefits:

1. Understand the definition of the secondary storage

2. Understand the reasons that led to the secondary storage becoming a new investment

3. Understand the basic situation of typical secondary storage vendors

4. Suggestions for storage vendors and users

Speaker:Huang Kun

Greater China Technical Director, Rubrik

Mr. Huang has worked in the IT industry for more than 21 years and has extensive experience in systems management, database management, IT consulting and data center architecture design. He has been focusing on helping customers with system reliability and continuity issues in the past 15 years.

Bebefore joining Rubrik, Mr. Huang served as a senior chief architect for Veritas Greater China and focused on leveraging Veritas' full line of products to help large enterprise customers design data protection and disaster recovery solutions for the telecommunications, financial and energy industries. Successful experience in designing challenging solutions with a large number of petabytes of data and massive business systems.

Topic: Modern Enterprise Backup Architecture

Today's enterprise IT is already in a different environment and is still evolving rapidly. The target of modern IT architecture design is to innovate quickly, empower the business, and increase revenue growth - in other words, prepare for the future.

Different companies and business units use different names to describe this preparation. You may be dealing with software-defined data center initiatives, digital transformation initiatives, migration to hybrid clouds, automated operations, Devops, Infrastructure as Services, and even infrastucture as code.

For the technical staff who are in the architectural design role, there are two types of IT tools when looking for these major initiatives. Traditional backup and recovery is a classic example of a barrier to technology. This architecture crashes as you expand to more and more sites. Assuming you have recently merged or are building an internal private cloud, companies need a new architecture to eliminate these legacy barrier. This architecture requires a collection of the necessary components to build a data protection architecture into a unified, complete framework.

Audience benefits:

1. Understand the core technical challenges faced by backup systems in the wake of the transformation of enterprise IT systems

2. Exploring how the backup system develops in the cloud computing revolution, how to design the corresponding data protection architecture

3. Understand how emerging data management technologies based on backup can help companies achieve their goals

Speaker:Sun Cheng

Technical Director,East China Region, SCUTECH CORP. He graduated from Shanghai Jiao Tong University with a master's degree in control science and engineering. He has served as the director of China UnionPay Advanced System R&D and CUTECH CORP, has long been engaged in technical research in data-level disaster recovery and backup, and is committed to providing higher-level systems and data applications. Security services have led and participated in the construction of disaster recovery backup systems in a number of financial, government, and domestic sectors, including the application of CDM technologies for several large projects.

Topic: Data Security Management Operation and Maintenance Practice Based on CDM Technology

As a key technology in the field of data security, CDM greatly reduces the time for data acquisition, expands the application scenarios of backup data, and reduces the utilization of storage resources. This presentation aims to combine the data disaster recovery, data sharing, development testing, etc. of CDM technology and security management technology, and explain the application prospect and value mining of CDM technology through comprehensive data comparison analysis and actual financial application cases.

Audience Benefits:

1. The implementation plan of Dingjia Technology CDM technology;

2. The practice of data copies in the operation and maintenance of financial users;

3. Data copy technology selection reference in multi-service scenarios;

Speaker:Li Yuliang

Director of R&D, Data Security Products Division, Suninfo Information Technology Co.,Ltd

10 years of IT industry experience, long-term policy tracking, technical research and product research and development of data security governance, has rich experience in data security management for key industries such as finance, medical care and government.

Topic: Data Security Governance in the Second Storage of the New Era

With the successive implementation of laws and regulations such as the "Network Security Law of the People's Republic of China" and the "General Data Protection Regulations of the European Union", data security governance has entered a new era. Enterprises need to invest more energy and cost, and adopt more ideas and technologies to meet the requirements of New Time Data Management. Suninfo's agile data management platform ADM, consists of backup data management, sensitive data management and test data management. It uses database virtualization and data desensitization technologies to provide efficient use and security compliance for the second stored data in different scenarios an overall solution.

Audience benefits:

Learn about the latest data security and privacy protection policies, and the second storage data security governance theory.

Speaker:Liu Hongwei

Micro Focus Greater China Information Management and Application Lifecycle Management Technology Director

20 years of IT experience, long-term experience in large-scale customer consulting and solution design, and participated in key projects of many large institutions such as Industrial and Commercial Bank of China, China Construction Bank, and General Administration of Customs. He has extensive experience in information governance, application lifecycle management, and big data.

Topic: Data archiving keeps your app full of youth

As time goes on, there will be more and more data in the application system. This brings a series of related problems and challenges. Micro Focus SDM software enables structured data management, archives cold data in the system, and compresses the amount of data in the production system, thereby increasing the pressure on data insertion and query operations. SDM's unique transparent layer also allows applications to access both production and archive data.

Audience benefits:

1. Respond to the processing difficulties under the long-time production environment

2. Reduce the cost of storage required

3. Reduce the time required for backups, migrations, etc.

Speaker:Wang Gang

Chief architect of UNIS WDC, has served as the pre-sales director of China at Quantum International, also served as senior technical consultants in Veritas and STK; more than 16 years experience of enterprise storage implementation and architecture design;

Topic: Unified Data Platform Management Based on Object Storage

With the advent of artificial intelligence and massive data era, the volume and growth rate of unstructured data exceeds the user's expectations; the effective and cost-effective second storage platform is based on the same share. The massive data access of space is the focus of most users; The enterprise-level commercial mass object storage platform provided by UNIS WDC, can effectively solve the problems of high cost, small capacity and difficult upgrade in enterprise data backup and archiving process. At the same time, solving AI problems such as high-speed sharing and intelligent retrieval of unstructured data in enterprises;

Audience Benefits:

1)To clearify the problems and pain points in the data backup and archiving; Creation of a good foundation for the private cloud platform in the massive data era;

2)the construction of second storage platform.

Speaker:Li Lizhong

AsiaInfo Cloud Security Product R&D Director

Joined Deep Security in 2005, engaged in software development, through gateway security, terminal security product line and enterprise information security product line.

Started in the field of cloud security in 2010, serving R&D team and product maintenance team to serve global customers.

In 2016, he was responsible for leading the research and development team of the AsiaInfo Cloud Security product line, responsible for the development, maintenance and operation of cloud security products."

Topic: Precision orchestration to create future data center security

After we evolved into a software-defined data center, the establishment of a security system is not simply a matter of moving past security protection products to a software-defined data center. We must understand the future trend of threats, and at the same time sort out the key data assets, coupled with a solid security system theory, to build a complete defense system, in order to fundamentally reduce the risk of threats to the business.

Audience Benefits:

This session will show you the current threat landscape in software-defined data centers and how to use a well-arranged model to build a security system while balancing the risks and input costs.

return