Student, Faculty, and Staff Data Availability and Protection What’s the Back-Up Plan? (for academic computing) Sponsored by.

Slides:



Advertisements
Similar presentations
UTILIZING WITH ITA. offers an entire suite of benefits for you and your students. You can also set up s for the purpose.
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Save Time, Money, and Energy by Virtualizing Your Environment Mica Lyman and Shawn Harpe Oklahoma State University Copyright Mica Lyman, Shawn Harpe 2007.
A Successful Help Desk Process for all IT Support
SOFTWARE SOLUTIONS Identification, Server-Side Printing, Tracking & Mobility Software TEKLYNX CENTRAL Bundled Solutions.
An Integrated Approach to Computer and Information Literacy Linda Ehley Alverno College Associate Professor CS EDUCAUSE 2003 Copyright – Linda Ehley 2003.
Administrative Data and Curricular Support: The Sum is Greater Than the Parts NERCOMP 2004 Copyright Bret Ingerman, Daniel Green, and Beth DuPont, 2004.
Tools for Help Desk Management: Assessment & Guidance Karen Pothering Elinor Pennsylvania State University "Copyright.
What Does the Net Generation Expect From Us? SAC August 8, 2005 SAC August 8, 2005 Copyright © 2005, Joel L. Hartman. This work is the intellectual property.
Handheld Contact Wireless syncing ACT! Blackberry and Windows Mobile 5/6.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Introduction to Computer Administration Introduction.
© Copyright Computer Lab Solutions All rights reserved. Do you need usage information about your computer labs? Copyright Computer Lab Solutions.
Cut Costs and Increase Productivity in your IT Organization with Effective Computer and Network Monitoring. Copyright © T3 Software Builders, Inc 2004.
A Web-based Bibliography Management Initiative: Collaborating for Classroom and Library Technology Integration Brian Nielsen, Academic Technologies Denise.
Disaster Recovery Planning Because It’s Time! Copyright Columbia University and Bentley College, This work is the intellectual property of the author.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
Copyright Sylvia Maxwell and Michael White, This work is the intellectual property of the author. Permission is granted for this material to be shared.
February 2006 copyright Michael Welch, Blinn College This work is the intellectual property of the author. Permission is granted for this material to be.
Educause Security 2007ISC Information Security Copyright Joshua Beeman, This work is the intellectual property of the author. Permission is granted.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Webdisk Storage Anywhere, Anytime for Everyone Presented at Educause, 2003 Copyright 2003, Jeremy Mortis and Harold Esche. This work is the intellectual.
Procurement From the 20 th to the 21 st Century Copyright Byron Honoré This work is the intellectual property of the author. Permission is granted.
Copyright Statement © Jason Rhode and Carol Scheidenhelm This work is the intellectual property of the authors. Permission is granted for this material.
Copyright C. Grier Yartz This work is the intellectual property of the author. Permission is granted for this material to be shared.
Copyright Copyright Alayna Wadleigh and Blaine Hensley This work is the intellectual property of the author. Permission is granted for this material.
Easing into the paperless era with Workflow Managers Christopher Zorn, Brian Dadin, Frank Starmer IT Lab Medical University of South Carolina Copyright.
Copyright Anthony K. Holden, This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Unraveling Web Development PRESENTERS: Bob Nakles and Paras Kaul, George Mason University.
Copyright Shanna Smith & Tom Bohman (2003). This work is the intellectual property of the authors. Permission is granted for this material to be shared.
Turning Information Into Action: Enterprise Reporting at Columbia University Maria E. Mosca, Director Student Information Systems Columbia University in.
West Virginia University Office of Information Technology Support Services One Stop Shopping For IT Support Services Sid Morrison Director, OIT Support.
Risk Assessment 101 Kelley Bradder VP and CIO Simpson College.
Offsite Backups. The purpose of this Startup Guide is to familiarize you with Own Web Now's Offsite Backup offering and show you how to purchase, deploy.
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
Copyright Tim Antonowicz, This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial,
Baylor University and Xythos EduCause Southwest 2007 Dr. Sandra Bennett Program Manager Online Teaching and Learning System Copyright Sandra Bennett 2007.
Marywood University, Scranton, PA Small Staff– Big Demands : Computer Training and User Support in Higher Education Kay McClintock, M.S. Coordinator of.
1 No More Paper, No More Stamps: Targeted myWSU Communications Lavon R. Frazier April 27, 2005 Copyright Lavon R. Frazier, This work is the intellectual.
Page 1 Copyright Jill M. Forrester This work is the intellectual property of the author. Permission is granted for this material to be shared for.
Information Technology Services 1 Copyright Copyright Marc Wallman and Theresa Semmens, This work is the intellectual property of the authors. Permission.
With Internet Explorer 8© 2011 Pearson Education, Inc. Publishing as Prentice Hall1 Go! with Internet Explorer 8 Getting Started.
Test Review. What is the main advantage to using shadow copies?
Chapter 7: Using Windows Servers to Share Information.
EDUCATION YOU CAN TRUST ® Windows SharePoint Services Course Review Review provided by: DNS Computing Services, LLC
Making the Internet a Better Place for Business NIST PKI Steering Committee March 14, 2002.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
When your world feels like a disconnected information relic… Someone has a bright idea that changes everything… When your world feels like a disconnected.
Chapter © 2006 The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/ Irwin Chapter 7 IT INFRASTRUCTURES Business-Driven Technologies 7.
Learning and Engagement in Library Spaces Suzanne E. Thorin Ruth Lilly University Dean of University Libraries and Associate Vice President for Digital.
Copyright David A. Cox This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial,
Cdigix at Yale Chuck Powell Director, Academic Media & Technology, ITS Yale University September 15, 2004 Copyright Charles Powell.
Enveloc ®, Inc. The Importance of Data Backup Enveloc, Inc. USA Technology & Research Park 775 N. University Blvd. Suite 110 Mobile, AL
Ruby Manager Overview Copyright 2006 VeriFone, Inc. All rights reserved. No part of this publication may be copied, distributed, stored in a retrieval.
Copyright Statement Copyright Robert J. Brentrup This work is the intellectual property of the author. Permission is granted for this material to.
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
THE WINDOWS OPERATING SYSTEM Computer Basics 1.2.
SharePoint ShortUrl and SharePoint Document Merge SharePoint and Office 365 Add-ins to Increase Productivity and Improve User Adoption! OFFICE 365 APP.
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
DOCUSHARE AND THE TOWNSHIP OF TINY
3 Drexel X Google X Microsoft
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Julian Hooker Assistant Managing Director Educause Southwest
Evolving Academic Computing Offerings: A Successful Strategy
Which is right for your business, Office 365 or Microsoft 365?
Networks Software.
Which is right for your business, Office 365 or Microsoft 365?
Project for OnLine Instructional Support (POLIS)
myIS.neu.edu – presentation screen shots accompany:
An App A Day Copyright Tina Oestreich and Brian Yuhnke This work is the intellectual property of the author. Permission is granted for this material.
Presentation transcript:

Student, Faculty, and Staff Data Availability and Protection What’s the Back-Up Plan? (for academic computing) Sponsored by

1 redBoomerang EDUCAUSE Disclaimer Copyright MCG, Internet Services, Inc., This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

2 Who Are MCG and redBoomerang MCG, Inc. is a development and consulting company with 22 years experience in the technology field Corporate offices in New York City; Remote co-locations in Wappingers Falls, NY and Eastern, LI redBoomerang is the most recent product offering from MCG, Inc. redBoomerang is a combination of client software, server software, Internet portal, and off site storage and retrieval

3 Fully automated, secure, remote backup system for higher education consisting of: –Software for selecting critical data to be protected –Service to store and catalog backed-up files in secure, remote storage –Electronic log to advise of problems and issues –Web portal for statistical reporting U-Vault is the backup solution when it comes to campus computing! What is U-Vault, powered by redBoomerang?

4 How Does U-Vault Work ? Install the software on your workstation or server Select the data to be protected with the easy-to-use Windows Explorer interface or have it pre-selected Schedule automatic backup time or allow random time within a window U-Vault automatically compresses the selected data Your critical data is encrypted for security A secure connection to our data center ensures security over the Internet You can check the backup log for results

5 What Critical Data Should U-Vault Protect? Word Processing Spreadsheets Homework Research and Term Papers Music Pictures * And much more! – Just ask your students and faculty what they can ill afford to be without should they ever suffer a data loss incident…

6 Hardware and Operating System Requirements Workstations - Windows 95, 98, Me, 2000, XP Networks – Windows 2003 & 2000, Windows NT4.0 & Novell Platforms – Unix, AS400 & Windows

7 Why U-Vault, powered by redBoomerang? Ease of Use Automatic schedule for backup Automated log after backup No additional equipment to purchase Uses existing University infrastructure Keeps multiple versions of files Compresses data prior to sending Encrypts data prior to sending Student access year round (not just while on campus) Decreased IT support while providing increased student support

8 redBoomerang Infrastructure Layout

9 Campus Branding Options U-Vault, powered by redBoomerang corporate brand University co-brand – Your Solution, powered by redBoomerang Private label – Perfect for shared resource rings, consortium, and corporate/academic collaboration

10 Implementation and Cost Preloaded on laptop image Distribution via /hyperlink Account creation Define backup set Set backup schedule Training and support Subscriptions from $99 per student/ faculty/staff/alumni per calendar year Volume pricing plans available

11 Consider U-Vault for your acedemic computing remote backup component

12 Sample screen capture U-Vault automatically protects data on the desktop and in the “My Documents” folder Can be configured for any other folders and/or files Compressed, encrypted, and secure Get IT Back, instantly, with U-Vault!