Presentation is loading. Please wait.

Presentation is loading. Please wait.

Disaster happens; don’t be held hostage

Similar presentations


Presentation on theme: "Disaster happens; don’t be held hostage"— Presentation transcript:

1 Disaster happens; don’t be held hostage
Sal Malik, Sales Engineer Hi everyone. I am {name}, {title} at Carbonite and I am excited to tell you about our EVault data protection suite and share some best practices for creating a disaster recovery strategy that makes your data disaster-proof. So let’s get started… There’s a lot to consider when planning a disaster recovery strategy and making your data disaster-proof. At the end of the day, when you lose data, the key to getting it back depends on the cause of data loss and the tools you have to recover it.

2 Key considerations for disaster-proof data
What are your risk factors for data loss? How secure is your data? What are your risk factors for data loss? How easily can you recover data? How secure is your data? We’ve all seen the headlines, with one company after another being hit by hackers or ransomware. The fact is, today, virtually no company is immune to data loss which means there are basically two kinds of companies: those that have lost data and those that will. To protect your business from the cost and consequences of downtime, you need a disaster recovery strategy that makes your data disaster-proof. There are 3 key considerations for disaster-proof data: The state of your data Your data exists in one of three states, and I’ll talk more about them in a minute. How you manage them will determine how disaster-proof your data is. The security of your data Now more than ever, data security is a top concern. You need defensive tools that eliminate data threats. The recoverability of your data In a disaster-proof environment, when you lose data or access to it, recovery should be simple and straightforward. © 2016 Carbonite Inc. All rights reserved.

3 Risk factors for data loss
We asked IT pros what they consider to be the highest risk factors for data loss Man-made disasters 60% Security incidents 59% Technology failures 65% Last year, we surveyed IT pros from SpiceWorks on their experience with data loss, disaster recovery and everything that goes into having to secure data for a business. We asked them what they consider to be the highest risk factors for data loss. You can see that about two-thirds are pretty concerned about these three risks. But when we look at what the actual causes of data loss are…

4 Actual risk factors for data loss
Technology failures 29% Security incidents 22% Man-made disasters 65% You’ll see that human error is far and away the most prevalent cause of data loss. POLL: How many of you have experienced employee or user-related data loss in the past year? How many of you were able to recover everything? So, obviously your employees and / or users are your biggest threat. So whether they’ll leaving laptops at airport security, plugging in a space heater and causing a short circuit, or clicking on an from a business contact in Nigeria that REALLY needs somewhere to park their millions for a couple months, you need to think about how to proactively protect against their terrible decisions.

5 The security of data Security is a top concern among IT professionals
Companies are quietly paying ransoms of $10K+ Cybercrime is a $100B+ business Anti-virus isn’t enough Ransomware is rampant (fightransomware.com) POLL: How many of you have had users impacted by ransomware? Did you have to pay the ransom? As you know, data breaches are becoming more widespread and a company’s reputation can be damaged with a single news story or social post. This is why your data needs to be disaster-proof. Disaster-proof data is protected from major threats: A business with disaster-proof data should never have to pay a ransom to get its data back. Anti-virus software catches only half of active threats. Backup is an essential part of defending against malicious viruses like ransomware. Secure backup enables you to recover clean data from a point in time so you can get back up and running Disaster-proof data can meet minimum security standards: More and more businesses are required by law to use advanced encryption for data both at rest and during transit. Many businesses require zero-knowledge security, where the business has sole ownership over the data encryption key. And finally, offsite datacenters must operate at the highest classification levels for security.

6 The recoverability of data
About half have had to recover data in the past year A data loss event would consume 81% of IT resources Recovery must be accomplished in 24 hours or less POLL: How many of you have had to recover data in the past year? When we asked IT pros from SpiceWorks, we found that: about half have had to recover data in the past year 71% said they have to recover data in less than 24 hours 57% said a data disaster would demand 100% of IT resources 46% said loss of productivity/efficiency is the biggest hurdle they face When it comes to recovering data, there are two aspects to consider: user productivity and admin productivity. User productivity: Data is only productive if users can access it. What’s your plan to maintain user access to data when there’s an interruption? Admin productivity: How much of a strain does data recovery cause you? If managing your disaster recovery solution is too cumbersome, it takes you away from other critical areas of the business. When data loss happens, IT productivity and efficiency grind to a halt

7 Three keys to data productivity
Only a solution designed for backup will keep data accessible in any scenario. There’s no recovery without backup Businesses need the tools to recover what you need where you need it. There’s no backup without recovery Any solution that takes IT away from key initiatives hurts productivity. There’s no resiliency without simplicity Your disaster recovery solution should be designed to improve your productivity as well as your users’. If a solution is designed for backup, it should: Work automatically in the background without interfering with normal workflow Have advanced settings for scheduling, policy management and bandwidth throttling. Use advanced technology to shorten backup windows and reduce your data footprint. If a solution is designed for recovery, it should: Give you options for both granular and system restore. Let you restore from either a local or offsite source. Be fast, efficient and support the your RTO/RPO targets. If a solution is easy to use, it should: Have a friendly and intuitive user interface. Allow you to manage and monitor backups centrally. Enable you to log in, securely, from anywhere.

8 The Carbonite data protection portfolio
Carbonite Availability Carbonite Move Powered by DoubleTake Carbonite Hybrid Backup Carbonite Cloud Backup Carbonite Onsite Backup Powered by Evault Home VSB Small Medium MSP Carbonite Endpoint Backup (Datacastle RED) Carbonite Safe Backup Endpoint backup Server backup DRaaS/HA Carbonite’s broad portfolio enables hybrid backup and high availability with deployment flexibility.

9 Carbonite Endpoint Backup
QuickCache Vault Carbonite Endpoint Backup Enterprise-grade endpoint backup and archiving for laptop, tablet and smartphone data protection Protect all your endpoints in our cloud, the public cloud or onsite Quick, silent and centralized deployment & management Simple backup policy creation and control Remote access from any device, anywhere, anytime Optional QuickCache for LAN-speed time-to-protection Deployment flexibility – companies are continually dealing with new challenges. A new office, a new country, a new compliance regulation. For larger companies it can be even more complex with unique compliance requirements for each country, office, or division. Carbonite offers deployment flexibility – backup directly to Carbonite, deploy a vault in a local Azure data center, deploy an on-premise vault, add a quick cache for network efficiency, or combine these options to meet your specific needs. Also, since regulations change, you have the flexibility to change your solution over time and expand in a scalable way while ensuring compliance. Data breach – with an increasingly mobile workforce, you need to know where your devices are and where your data is. When someone leaves a laptop in the airport, you need to be able to remotely wipe that device in a secure manner and provide fast access to the data in the cloud back to that employee. Carbonite enables this. And how do you do this efficiently? You need to move as little data as necessary and as securely as possible. Remember, this is what Gartner rated Carbonite endpoint backup #1 for. Maybe some of your offices have great bandwidth – huge pipes but your backup strategy is only as good as your weakest link. That one remote office with limited bandwidth and some mission critical applications that you want to prioritize – that is the scenario you need to buy for. This is where the de-duplication makes a big difference. With Carbonite, you only backup files (actually only small blocks of files) once.

10 Backup and disaster recovery powered by EVault
Forever-incremental, encrypted and compressed backups Up to 7-year backup retention Straightforward recovery in hours or days Cost-effective protection for non-critical workloads Flexible deployment Branch office, central IT and cloud support Flexible restore Files, whole systems, VMs and bare metal Robust security Encrypted in-flight and at-rest (you hold the keys) Award-winning support 24x7 phone support from certified experts x86 and legacy systems Support for AIX, iSeries, HP-UX and Solaris Cloud backup Secondary copy secured in the Carbonite cloud Hybrid backup Local copy on Carbonite appliance—and a copy in the cloud

11 Backup and disaster recovery powered by EVault
Broad based platform support – easy to deploy, monitor, manage Choose systems you want to protect Create and deploy backup policies Monitor status for multiple systems

12 Availability and migration powered by DoubleTake
Continuous replication to a secondary site for high availability and risk-free migration of physical, virtual and cloud servers Continuous replication Byte-level protection from primary site to secondary target Near-zero downtime Recovery times in minutes—with sub-second recovery points Reliable for IT maintenance Easy to fail over instead of planned outages Scalable design Negligible performance impact across protected systems Award-winning support 24x7 phone support from certified experts Carbonite Availability powered by DoubleTake Continuous replication and flexible failover for key systems Carbonite Move powered by DoubleTake Risk-free migration between any two systems

13 Carbonite Availability: How it works

14 Protect and physical, virtual, or cloud system to any target

15 Thank you! Questions? Come by the booth!


Download ppt "Disaster happens; don’t be held hostage"

Similar presentations


Ads by Google