Iron Mountain’s Continuity Service ©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered trademarks of Iron Mountain Incorporated. NameTitleDate
CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN2 Continuity Service Iron Mountain’s Continuity service ensures that your organization will never lose access to No matter what happens to your physical facilities, data center(s), servers, software, network connectivity or even IT staff, Iron Mountain’s Continuity service ensures that will always be up and running. With Iron Mountain’s Continuity service, between company executives, staff and employees, customers, prospects, and suppliers, will always work. The Value Proposition
CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN3 Will Fail is the #1 most critical enterprise application but is not high-availability today Outages Have Real Costs Will Fail A 5,000 person health care provider lost $3 million during 8-hour outage when IT staff accidentally shut down data center power Five financial services firms were fined a total of $8.25 million for failure to protect and preserve communications A 2,000 person national law firm CIO estimates a recent outage cost the firm $100,000/hr in lost revenue and productivity A national financial services firm lost $6 million from virus-related outage plus damage as retail financial planners lost access to calendar used to track customer appointments Fact: 75% of systems will fail in the next 12 months
CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN4 is Difficult to Protect Replication, Clustering, and SANs do not provide adequate protection for Traditional Solutions Provide Minimal Protection Source: MessageOne Activation Data Are vulnerable to Exchange / Windows flaws Are dependent on ActiveDirectory Are dependent on your infrastructure & staff
CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN5 Continuity Service Overview Iron Mountain’s Continuity service is a stand-by system that ensures continuous access to Transparent 60-Second Continuity Customer is always in control of activation (for security) and may fully activate in 60-seconds to provide access via web & BlackBerry™ during any outage Easy to Deploy & Manage Automatically “syncs” user accounts, directories, historical , contacts, calendars, and distribution lists to Iron Mountain’s global data center network Cost Effective You control the cost by determining how much historical you want to retain for each user Designed for Immunity & Security Linux-based system provides immunity from Windows™ viruses and database corruption, fully encrypted transport & storage, and support for Windows authentication Quick & Compliant Recovery Automatically restores all sent and received on the ECS back to the primary system with all forensic information - - fully compliant with all major archives Iron Mountain’s Continuity service
CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN6 Continuity Service Overview How the Continuity service works One day deployment Fully automated synchronization No dedicated support required Activate by web or phone Activate for any group of users, servers, or storage groups Always-on protection, not always-on access: Not a rogue system prone to intrusion Access mail via web or BlackBerry™ Uses corporate Windows password Access contacts, calendar, distribution lists Includes historical Automated recovery of and all metadata into primary servers Fully compliant with all major 3rd-party archives
CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN7 The Continuity Service Cost-Benefit Advantage Continuity Continuity offers near immediate availability at a radically lower price point Managed service model enables 1-day deployment and no dependency on customer environment Use a standby system while you repair your primary environment Fully complementary to tape backup, replication, and other recovery solutions ECS provides effective continuity at the lowest possible TCO
CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN8 Summary: Essential Continuity Requirements Customers choose the Continuity service because it meets 5 essential requirements ECS Ensures % Availability Only approach to protect against geographic and technical threats Not dependent on your datacenters, infrastructure, or IT staff Not vulnerable to flaws in Windows or Exchange Only solution delivered from global network of hardened Tier 4 datacenters Always-on protection ensures that no will ever bounce Includes all Essential Functions Send and receive and view historical Access calendars and contacts Full synchronization of global address list and distribution lists Supports Wireless Devices Send and receive from BlackBerry™ devices during any outage No end-user reconfiguration required Addresses Essential Security Requirements Not an “Always On Access” rogue system that is prone to intrusion Full integration w/ Windows authentication: no need for additional password All historical encrypted for transport and storage Fully Archive Compliant All messages are restored to the proper folder (inbox, sent, deleted) All message attributes are retained such as (date/time, read/unread, BCCs) Integrates recovery process with all major archive vendors 5 reasons why 1,000 Companies have chosen the Continuity service