Founded in 1981, Executive Software is the industry leader in system performance software for Windows NT/2000/XP and DEC VMS systems. Developed Diskeeper,

Slides:



Advertisements
Similar presentations
True Business-Class Remote Online Backup 44% Of All Computer Users Have Reported At Least One Permanent Data Loss Your Business Data IS Your Business –
Advertisements

Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens.
Microsoft System Center Data Protection Manager Mat Young – Storage Technology Architect, Microsoft EMEA Justin Alderson – Storage Specialists Manager,
A new standard in Enterprise File Backup. Contents 1.Comparison with current backup methods 2.Introducing Snapshot EFB 3.Snapshot EFB features 4.Organization.
1 of 2 By observing the guidelines below and performing regular maintenance on your computer, you can help keep your computer safe and maintain optimum.
1 X-Ways Security: Permanent Erasure Supervised By: Dr. Lo’ai Tawalbeh Prepared By :Murad M. Ali.
Backups Rob Limbaugh March 2, Agenda  Explain of a Backup and purpose  Habits  Discuss Types  Risk/Scope  Disasters and Recovery.
Explanations Of Software Utilities By Tim Wong.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
© 2008 Kroll Ontrack Inc.| Ontrack PowerControls 5.1 The ultimate “power tool” for SharePoint administrators.
Computer Referbishment The Demonstration. To Do… Virus Protection Schedule A Full System Scan Install Service Pack 3 Clean Up Tools Drive Formatting Install.
The Ultimate Backup Solution.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Patricia O’Brien30 June 2015 Housekeeping your PC Training Session for XP and VISTA.
Chapter 11: Maintaining and Optimizing Windows Vista
Preservasi Informasi Digital.  It will never happen here!  Common Causes of Loss of Data  Accidental Erasure (delete, power, backup)  Viruses and.
MDOP 2010: Diagnostic and Recovery Toolset (DaRT) Speaker Fabrizio Grossi
Back Up and Recovery Sue Kayton February 2013.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
COMPUTER FUNDAMENTALS David Samuel Bhatti
By Joseph Campbell. Objectives  Identify problems that can occur if hardware is not properly maintained.  Identify routine maintenance that can be performed.
Course 6425A Module 9: Implementing an Active Directory Domain Services Maintenance Plan Presentation: 55 minutes Lab: 75 minutes This module helps students.
Chapter 7 Working with Files.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
LAN / WAN Business Proposal. What is a LAN or WAN? A LAN is a Local Area Network it usually connects all computers in one building or several building.
10 Tips for keeping MCL safe 1. Set up your defenses. Do you have adequate firewalls and antivirus software to protect you from hackers who could steal.
How To Fix Common Computer Errors m.
Operating Systems Concepts 1/e Ruth Watson Chapter 4 Chapter 4 Windows Utilities Ruth Watson.
Dr.Backup Online Backup Service (888) (toll free)
Week #7 Objectives: Secure Windows 7 Desktop
Chapter Fourteen Windows XP Professional Fault Tolerance.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Chapter 18: Windows Server 2008 R2 and Active Directory Backup and Maintenance BAI617.
PC Maintenance How to keep your computer healthy.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
With Windows 7 Introductory© 2011 Pearson Education, Inc. Publishing as Prentice Hall1 Windows 7 Introductory Chapter 2 Managing Libraries Folders, Files.
Software Software consists of the instructions issued to the computer to perform specific tasks. –The software on a computer system refers to the programs.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
11 DISASTER RECOVERY Chapter 13. Chapter 13: DISASTER RECOVERY2 OVERVIEW  Back up server data using the Backup utility and the Ntbackup command  Restore.
1 Week #10Business Continuity Backing Up Data Configuring Shadow Copies Providing Server and Service Availability.
Lesson 12: Using the Recycle Bin deleting files or folders what the Recycle Bin is restoring files from the Recycle Bin emptying the Recycle Bin identifying.
OS Troubleshooting Written by: Tim Keyser Georgia CTAE Resource Network 2010.
The Ultimate Backup Solution.
Understanding Backup and Recovery Methods Lesson 8.
Operating Systems Written by: Tim Keyser Georgia CTAE Resource Network 2010.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Chapter 6 Protecting Your Files. Protecting Your Files FAQs: – What should I know about losing data? – How can I protect my files from viruses? – How.
Matthew Glenn AP2 Techno for Tanzania This presentation will cover the different utilities on a computer.
Palm Creek RV and Golf Resort December 07, 2011 Garth Vanstone.
Technology Education THE PERSONAL COMPUTER (PC) SOFTWARE PART 1.
© 2014 VMware Inc. All rights reserved. Cloud Archive for vCloud ® Air™ High-level Overview August, 2015 Date.
©2011 Quest Software, Inc. All rights reserved. Quick, Scalable Restore of Granular Objects Recovery Manager for Active Directory.
Sniper Corporation. Sniper Corporation is an IT security solution company that has introduced security products for the comprehensive protection related.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Instant File Recovery and Data Protection for Windows ® Networks.
Pasewark & Pasewark 1 Windows Vista Lesson 1 Windows Vista Basics Microsoft Office 2007: Introductory.
SkyKick Cloud Backup Battlecard
Server Upgrade HA/DR Integration
Online Backup Service 30 Day FREE Trial
HOW TO RECOVER DELETED PHOTOS FROM HP LAPTOP?. Every user faces this terrifying moment where users pressed the button labeled “Delete All” unwillingly.
Introduction to Computers
How to Solve Issue “Apple MacBook Not Accepting Password”?
The Ultimate Backup Solution.
The Ultimate Backup Solution.
Have you seen this screen?
CIS MS Windows Operating System
Presentation transcript:

Founded in 1981, Executive Software is the industry leader in system performance software for Windows NT/2000/XP and DEC VMS systems. Developed Diskeeper, the first on-line, Set It & Forget It defragmenter for VMS, and Windows. Because of our years of experience in mission critical networked environments, in 1994 Microsoft asked us to develop Diskeeper for Windows NT. Executive Software has won numerous industry awards!

Undelete was created to fill the need to quickly recover files that have been deleted - accidentally, in error, or maliciously.

Friday—5:00PM A senior executive has just deleted across the network a critical file needed for a meeting on Monday morning.

Oops!!!

Windows Recycle Bin Only captures files deleted from Explorer  If it is not in the recycle bin you can’t recover it –Doesn’t capture files deleted from: Shared Network Drives. OR...

Files you will never find in the Recycle Bin:  Files deleted across a network  Files deleted from the Command prompt  Files deleted from most applications  Files deleted while holding down the Shift key  Files deleted from File Manager  Files emptied from the Recycle Bin

QUESTION: QUESTION: Which Item Below Causes More Data Loss? COMPUTER VIRUSES HUMAN ERROR (Accidental or Deliberate) OR DO YOU KNOW?

ANSWER: HUMAN ERROR Based upon analysis of 100,000 data recoveries by Ontrack Data International, Inc. ( Analysis of 100,000 data recoveries show that viruses cause only 7% of data loss. This is due to the proliferation of anti-virus software Undelete is the only software designed to protect the data on Windows Networks from Human Error

ANSWER: HUMAN ERROR When users move data across the network, anything can happen

Eliminating Data Files Is Costly For Business “A survey of 300 system managers released last week said accidental deletions cause 30 times the data loss that viruses do.” “Losing data between backups is a huge fear among 54 percent of system managers.” “Accidental deletions could be costing United States corporations $15 Billion a year.” Eliminating Data Files Is Costly For Business “A survey of 300 system managers released last week said accidental deletions cause 30 times the data loss that viruses do.” “Losing data between backups is a huge fear among 54 percent of system managers.” “Accidental deletions could be costing United States corporations $15 Billion a year.”

Friday—5:10PM The executive catches you as you’re about to leave for a week- end trip and makes it your problem!

Friday—8:00PM After you’ve spent two & one-half hours searching yesterday’s back-up tape, the exec complains to you that he worked for 8 hours today creating his presentation from scratch. “SO YOU BETTER FIND IT!”

It’s NOT on the back-up tape!

The sponsors of this presentation have ruled that this slide is too graphically violent, and should not be shown.

A Bad Day Getting Worse!!!

System Administrator’s Nightmare Wasted Time & Lost Productivity Tape backup is NOT the solution:  Tapes are not always reliable  Searching for files is very slow  Data created since last tape backup is lost

Undelete 3.0 for Windows NT/2000/XP Solves Data Recovery Problems Introducing: The Recovery Bin Undelete safely replaces the recycle bin with a Recovery Bin

Undelete 3.0 for Windows NT/2000/XP Undelete 3.0 for Windows NT/2000/XP The Recovery Bin captures ALL Deleted Files... EXCEPT The ones YOU Want Deleted!

Between-backup recovery Undelete recovers files and versions that would otherwise be lost forever.

NEW! SecureDelete TM Permanently deletes confidential “trash,” so sensitive data doesn’t get into the wrong hands.

Restores files remotely Undelete restores files over the network. Now system administrators can quickly recover files from anywhere on the network Undelete is installed without leaving their desks (Server with Workstation versions).

The Undelete From Disk feature will scan, find and recover any deleted file directly from the disk if it hasn’t been overwritten. Undelete From Disk

Emergency Undelete ® If a file was accidentally deleted before Undelete was installed, Emergency Undelete can be run from the Undelete CD to recover files directly from the disk—without the risk of overwriting them.

NEW! Time-based Recovery Bin Purge Set Undelete to purge the Recovery Bin at whatever time interval you choose.

NEW! Expanded search features Now you can get the exact file you need back faster. Search the Recovery Bin by date file was deleted or created, file owner, account file was deleted from or files deleted in a specified number of days.

Recover compressed files directly from disk.

What if a User emptied the Bin? What if a User emptied the Bin? Undelete from Disk  If it is not in the Recycle Bin or the Undelete Recovery Bin you can look at and recover directly from the disk itself –from their own desks, system administrators can recover files directly from any disk on the network

Familiar Explorer Interface

Configure Undelete to Work the Way You Want

Multiple Search Options

Undelete Files Directly From Disk

A System Admin Says… “ The ability to undelete a file that was accidentally deleted by a network user from a network share is absolutely essential to the daily operation of any respectable data center.”

Undelete 3.0 Creates a Safety Net of Networked Recovery Bins

Undelete guarantee If you’re not completely satisfied with Undelete, we offer an unconditional 30-day, money-back guarantee. With each Undelete purchase, you get free tech support for 90 days.

Undelete is a must for every workstation and every server. Buy Undelete today and protect your data full-time.

Your Ultimate Line of Defense Against Data Loss Regular Backups Undelete 3.0 +