VERITAS Confidential Copyright © 2005 VERITAS Software Corporation. All rights reserved. VERITAS, the VERITAS Logo and all other VERITAS product names.

Slides:



Advertisements
Similar presentations
Upgrade services, hosting & business continuity Simpler is better: Delivering IT as a Service John Allen: Business Development Manager Anix Managed Services.
Advertisements

Introducing FailSafeSolutions Online Backup Software.
How to Ensure Your Business Survives, Even if Your Server Crashes Backup Fast, Recover Faster Fast and Reliable Disaster Recovery, Data Protection, System.
Building the business case for Business Continuity Justin Davey Senior Consultant CA.
The System Center Family Microsoft. Mobile Device Manager 2008.
Case Study: Business Continuity Planning for Site- Level Disaster Kimberley A. Pyles Northrop Grumman Corporation
SQL Server Disaster Recovery Chris Shaw Sr. SQL Server DBA, Xtivia Inc.
Maximizing Uptime and Your Firm's Bottom Line: Understanding risk and budget when evaluating business continuity & disaster recovery protocols Michael.
Module – 9 Introduction to Business continuity
Business Continuity Section 3(chapter 8) BC:ISMDR:BEIT:VIII:chap8:Madhu N PIIT1.
©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain Digital is a trademark of Iron Mountain Incorporated. Stanford University ©2006 Iron.
VERITAS Confidential Disaster Recovery – Beyond Backup Jason Phippen – Director Product and Solutions Marketing, EMEA.
Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
© 2009 EMC Corporation. All rights reserved. Introduction to Business Continuity Module 3.1.
VERITAS Confidential Copyright © 2002 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other VERITAS.
1 Disk Based Disaster Recovery & Data Replication Solutions Gavin Cole Storage Consultant SEE.
Step 1-Do you need Backup and Data Protection? Can your Business Survive? Of companies that had a major loss of business data, 43% never reopen, 51% close.
Oracle Data Guard Ensuring Disaster Recovery for Enterprise Data
Iron Mountain’s Continuity Service ©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered.
Data Lost. What’s the cost? How to get your data back: Disaster Planning and Recovery Prevent losing data in the first place : Data Protection Go Virtual.
Information Means The World.. Enhanced Data Recovery Agenda EDR defined Backup to Disk (DDT) Tape Emulation (Tape Virtualization) Point-in-time Copy Replication.
Keith Burns Microsoft UK Mission Critical Database.
Disaster Prevention and Recovery Presented By: Sean Snodgrass and Theodore Smith.
Saving Your Business from a Data Loss Randy Clark.
Complete Data Protection from [INSERT SOFTWARE NAME] Insert logo.
1 © Copyright 2010 EMC Corporation. All rights reserved. EMC RecoverPoint One way to protect everything you have…better.
IBM TotalStorage ® IBM logo must not be moved, added to, or altered in any way. © 2007 IBM Corporation Break through with IBM TotalStorage Business Continuity.
Banking Clouds V International Youth Banking Forum.
Company Overview DATASTOR in Education By: Mike Ehring.
Now I can sleep at night Presented by Reliant Data, LLC
© Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 Buying factors – HP.
RBTC: Business Continuity 101 July 18, What is Business Continuity? Scenario Part 1 Why is BC important? What types of plans are needed? How do.
Copyright © 2002 VERITAS Software Corporation. All rights reserved. VERITAS, the VERITAS logo, and all other VERITAS product names and slogans are trademarks.
IT Business Continuity Briefing March 3,  Incident Overview  Improving the power posture of the Primary Data Center  STAGEnet Redundancy  Telephone.
Business Continuity and Disaster Recovery Chapter 8 Part 2 Pages 914 to 945.
Making Business Continuity Child’s Play Solutions Ltd Business Continuity Management Contact details: Contact : Mick O’Regan Mobile :
Data Management Services AssuredSnap. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection  Data.
#unitrends | THE FUTURE IS NOW Brad Gunderson Senior Sales Engineer – WI/IL Is Your Data Insured?
1 Solving the records management problem A cloud-computing approach to archiving Amanda Kleha Product Marketing, Google May 20, 2008.
DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection.
David N. Wozei Systems Administrator, IT Auditor.
Meeting the Data Protection Demands of a 24x7 Economy Steve Morihiro VP, Programs & Technology Quantum Storage Solutions Group
By Srosh Abdali.  Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure.
Protect and Recover Presented by:Toby Bishop, Senior UK Account Manager Date:Friday, 09 October 2015Friday, 09 October 2015Friday, 09.
©2006 Merge eMed. All Rights Reserved. Energize Your Workflow 2006 User Group Meeting May 7-9, 2006 Disaster Recovery Michael Leonard.
Partner Logo Overcoming Buyer Objections Q
Chapter © 2006 The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/ Irwin Chapter 7 IT INFRASTRUCTURES Business-Driven Technologies 7.
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
Component 8/Unit 9bHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 9b Creating Fault Tolerant.
CIT 470: Advanced Network and System AdministrationSlide #1 CIT 470: Advanced Network and System Administration Disaster Recovery.
The Best DR and “Undo” Virus Attacks!! What can Zerto do for you?
Microsoft and Symantec
Protecting Your Data With Just Get Backup, LLC. Agenda How important is your data – Acknowledging worst-case scenarios. Understanding that data backup.
Disaster Recovery: Can Your Business Survive Data Loss? DR Strategies for Today and Tomorrow.
Clint Wyckoff | Microsoft Product Strategy Veeam Software: Availability Strategies for Microsoft Azure and Hyper-V, A Deep Dive.
Business Continuity Management 101. KeepItSafe Professional Services The portfolio of business continuity management is to ensure we assist our clients.
가상화 기반의 Workload 관리솔루션 : FORGE PlateSpin Virtualization and Workload Management 나영관 한국노벨 /
Solving Today’s Data Protection Challenges with NSB 1.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
CDP Technology Comparison CONFIDENTIAL DO NOT REDISTRIBUTE.
Business Continuity Appliances Making the Business Case.
Planning for Application Recovery
Server Upgrade HA/DR Integration
Uptime All The Time: Doing Business In The Cloud
Microsoft Azure P wer Lunch
Protect | Transform | Innovate
Using the Cloud for Backup, Archiving & Disaster Recovery
Presentation transcript:

VERITAS Confidential Copyright © 2005 VERITAS Software Corporation. All rights reserved. VERITAS, the VERITAS Logo and all other VERITAS product names and slogans are trademarks or registered trademarks of VERITAS Software Corporation. VERITAS, the VERITAS Logo Reg. U.S. Pat. & Tm. Off. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Specifications and product offerings subject to change without notice.

VERITAS Confidential Protect Your Network Why Disaster Recovery Is Important

VERITAS Confidential Who is VERITAS Software? World’s Largest Storage Software Company –US$2.04BN Revenues –Over 7000 Employees –40 Countries 99% of Fortune 500 Rely on VERITAS Software

VERITAS Confidential VERITAS Data Protection Leader Backup & Recovery World Wide Cross Platform Windows Backup & Recovery

VERITAS Confidential Part 1 What is Disaster Recovery and what can you do about it?

VERITAS Confidential What is Disaster Recovery? Knowing the Difference Business Continuity –Business Continuity Management is a holistic management process that identifies potential impacts that threaten an organisation and provides a framework for building resilience and the capability for an effective response which safeguards the interests of its key stakeholders, reputation, brand and value creating activities. (Source: British Standards Institute PAS56) Disaster Recovery –Total loss of a computing environment from supporting the business. Recovery of the computing environment from an error or major site failure. Subset of Business Continuity. High Availability –A rapid process to move a business transaction from a failed component to a functioning component with minimal impact to the organisation and environment. Subset of Disaster Recovery.

VERITAS Confidential Disaster Recovery Things to Consider What is most important to any organisation? 1.People 2.Data and systems Protecting data and systems is difficult –Data is growing 50-80% per year (source: Gartner) –IT infrastructure is complex Server ApplicationDatabase Web Server Windows Environment Storage

VERITAS Confidential Disaster Recovery How Prepared Are Some Organisations? 38% of organisations in EMEA do not know how long it would take to recover from a fire disaster –Average recovery time of organisations that do know is 3.23 days –Only 3% said they could carry on with business as usual if a disaster happened Top 5 consequences of disasters: 1.Decreased employee productivity (62%) 2.Data loss (43%) 3.Reduction in profits (40%) 4.Damage to customer relationships (38%) 5.Reduction in revenue (27%) Source: VERITAS Disaster Recovery Research, Sept. 2004

VERITAS Confidential Indirect Costs Stock Price Reputation Market Share Brand Equity Customer Satisfaction Direct Costs Lost Revenue Lost Productivity Revenue is the Focus of Disasters …but more than revenue is a risk Criminal Liability

VERITAS Confidential Logical Outages Component Outages Site Outages What Can Happen? Threats to Availability of Data and Systems Software bug Virus Data corruption Accidental delete Dropped table D.o.S. Attack CPU fault Disk failure Array failure Host Bus Adapter Network Card Software Fire Power Outage Terrorism/War Flooding Storms Hurricane

VERITAS Confidential What Can Happen? Example: Blackouts (Power Outages) Rome New York London

VERITAS Confidential What Can Happen? Example: Data Corruption, Lost Data, Lost Productivity Lost productivity due to viruses in 2003 = $55 Billion Source: Trend Micro, 3/28/2004

VERITAS Confidential Are You Protected? Ask Yourself These Questions Have you ever lost data? –Gartner estimates that 40% of businesses that lose ALL their data go out of business within 5 years.** How much would 1 hour of downtime cost you? –Only 26% of all organisations have calculated the cost of downtime.* Do you test your disaster recovery plan yearly? –New studies say that up to 66% don’t.* * Source: VERITAS Disaster Recovery Research, Sept ** Source: Gartner, Sept. 2001

VERITAS Confidential Disaster Recovery Technologies An explanation of core disaster recovery concepts and technologies.

VERITAS Confidential Determining Your Recovery Needs Amount of data loss acceptable The point to which data must be restored RECOVERY POINT OBJECTIVE Amount of time it takes to come back online The time by which data must be restored RECOVERY TIME OBJECTIVE DaysMinsHrsWksSecs Recovery Point MinsDaysHrsSecsWks Recovery Time

VERITAS Confidential Determining Your Recovery Needs DaysMinsHrsWksSecsMinsDaysHrsSecsWks Recovery Point Recovery Time Tape Restore Clustering Snapshots Replication Tape Backup Periodic Replication Snapshots HA Zone

VERITAS Confidential Are You Protected? Ask Yourself These Questions How often do you backup your data? –Backup is the foundation of any good DR strategy as it is a point-in-time snapshot of data. The more often you backup the safer you are. How much data loss can you afford? (RPO) –Data is the lifeblood of most organisations and must be protected at all costs. New laws and regulations also dictate requirements for acceptable data loss. –Not all data is created equal, and because there’s a high cost associated with safeguarding data, pick and choose what to protect. How much downtime can you afford? (RTO) –Clustering (fastest) and Bare Metal Restore (fast) simply automate the tasks of getting back to business faster. The more critical the system the higher the need for automation. Only 5% of organisations use clustering to minimise downtime Source: VERITAS Disaster Recovery Research, Sept. 2004

VERITAS Confidential Part 2 Backup as the Cornerstone of a Solid Disaster Recovery Strategy

VERITAS Confidential Only backup provides: –Cost-effective portability of data –Protection against complete data loss –Protection against viruses and data corruption –Managed multiple point-in-time copies of data –Integrated archival management –Integrated desktop/laptop protection Backup does not provide –Instant access to data (short RTO) –Minimum data loss (short RPO) Why Backup Still Matters A Look at Key Issues

VERITAS Confidential Laptop & Desktop Data What Are Companies Doing Today? Network share is the most popular and least effective. WHERE DO YOU FALL? Network Share 55% Users Copy Locally 7% PC Backup Software 7% Synch Products 4% Software Solution 6% Server Backup 6% No Solution 15%

VERITAS Confidential Extending Data Protection IT Managers don’t have to worry about unprotected data –Protection occurs continuously, online to network storage or offline to the local hard drive –Tailored to meet the special needs of laptop users Users have full access to all of their data –Synchronizes data between desktops and laptops, data resides where the user needs it, designed for executives Integrates into existing IT infrastructure and policies, lowering TCO –Automates existing policy of having users copy data to existing network storage –Flexible, lightweight design with no large database or application to manage Limits IT Interaction with users, improving ROI –Users can restore their own files from network storage or local disk without intervention Helps ensure regulatory and audit compliance

VERITAS Confidential Summary

VERITAS Confidential The Backup Advantage Backup is the cornerstone of any disaster recovery plan –Last line of defense For disaster recovery planning, the backup solution must provide: –Technologies that enable faster recovery and reduce costs –System level protection, not just data –Automation that works when disaster strikes –Protection for servers and laptops/desktops

VERITAS Confidential The VERITAS Advantage in Backup VERITAS is #1 in the backup and recovery market Backup Exec provides the foundation required for a complete disaster recovery plan Backup Exec integration with other VERITAS solutions means flexibility and also customization based on availability needs

VERITAS Confidential Part 3 Disaster Recovery Preparedness Exercise

VERITAS Confidential Disaster Recovery Exercise Scoring: –Each YES gives 1 point Tips: –Be honest –There are no right or wrong answers –It’s okay to ask for help –If you don’t know the answer, then just guess

VERITAS Confidential Question 1 Do you have a disaster recovery plan?

VERITAS Confidential Question 2 Is your disaster recovery plan part of a larger business continuity plan?

VERITAS Confidential Question 3 Does Sr. Management know about the disaster recovery plan?

VERITAS Confidential Question 4 Do you use: Backup Replication Clustering Each YES is 1 point

VERITAS Confidential Question 5 Have you measured how much 1 day of downtime would cost you?

VERITAS Confidential Question 6 Can you accurately say how quickly you can recover from a disaster?

VERITAS Confidential Question 7 Do you test your disaster recovery plan weekly or monthly, or even quarterly? (Yearly is not good enough!)

VERITAS Confidential Question 8 Do you know your Recovery Point Objective for all customer-facing systems? (Call Centre, Web Apps, etc.)

VERITAS Confidential Question 9 Do you know your Recovery Point Objective for all partner-facing systems? (Supply Chain, B-to-B Apps, etc.)

VERITAS Confidential Question 10 Do you know your Recovery Point Objective for all internal-facing systems? (Order Entry, Purchasing, , etc.)

VERITAS Confidential Question 11 Do you store your tapes (data) offsite?

VERITAS Confidential Question 12 Do you protect laptops?

VERITAS Confidential Question 13 Do you protect desktops?

VERITAS Confidential Results 15-13: A comprehensive DR plan that can withstand any disaster is in place : A solid DR plan that can withstand most disasters is in place. 9-7: A basic DR plan is in place, but there are still many gaps. 6-4: If a disaster was to occur systems and data would be at serious risk. 3-1: You urgently need a DR plan. Start today!

VERITAS Confidential THANK YOU!