Presentation is loading. Please wait.

Presentation is loading. Please wait.

Disaster happens; don’t be held hostage

Similar presentations


Presentation on theme: "Disaster happens; don’t be held hostage"— Presentation transcript:

1 Disaster happens; don’t be held hostage
Tony DeMaria, Account Executive Hi everyone. I am {name}, {title} at Carbonite and I am excited to tell you about our EVault data protection suite and share some best practices for creating a disaster recovery strategy that makes your data disaster-proof. So let’s get started… There’s a lot to consider when planning a disaster recovery strategy and making your data disaster-proof. At the end of the day, when you lose data, the key to getting it back depends on the cause of data loss and the tools you have to recover it.

2 Key considerations for disaster-proof data
What are your risk factors for data loss? How secure is your data? What are your risk factors for data loss? How easily can you recover data? How secure is your data? We’ve all seen the headlines, with one company after another being hit by hackers or ransomware. The fact is, today, virtually no company is immune to data loss which means there are basically two kinds of companies: those that have lost data and those that will. To protect your business from the cost and consequences of downtime, you need a disaster recovery strategy that makes your data disaster-proof. There are 3 key considerations for disaster-proof data: The state of your data Your data exists in one of three states, and I’ll talk more about them in a minute. How you manage them will determine how disaster-proof your data is. The security of your data Now more than ever, data security is a top concern. You need defensive tools that eliminate data threats. The recoverability of your data In a disaster-proof environment, when you lose data or access to it, recovery should be simple and straightforward. © 2016 Carbonite Inc. All rights reserved.

3 Risk factors for data loss
We asked IT pros what they consider to be the highest risk factors for data loss Man-made disasters 60% Security incidents 59% Technology failures 65% Last year, we surveyed IT pros from SpiceWorks on their experience with data loss, disaster recovery and everything that goes into having to secure data for a business. We asked them what they consider to be the highest risk factors for data loss. You can see that about two-thirds are pretty concerned about these three risks. But when we look at what the actual causes of data loss are…

4 Actual risk factors for data loss
Technology failures 29% Security incidents 22% Man-made disasters 65% You’ll see that human error is far and away the most prevalent cause of data loss. POLL: How many of you have experienced employee or user-related data loss in the past year? How many of you were able to recover everything? So, obviously your employees and / or users are your biggest threat. So whether they’ll leaving laptops at airport security, plugging in a space heater and causing a short circuit, or clicking on an from a business contact in Nigeria that REALLY needs somewhere to park their millions for a couple months, you need to think about how to proactively protect against their terrible decisions.

5 The security of data Security is a top concern among IT professionals
Companies are quietly paying ransoms of $10K+ Cybercrime is a $100B+ business Anti-virus isn’t enough Ransomware is rampant (fightransomware.com) POLL: How many of you have had users impacted by ransomware? Did you have to pay the ransom? As you know, data breaches are becoming more widespread and a company’s reputation can be damaged with a single news story or social post. This is why your data needs to be disaster-proof. Disaster-proof data is protected from major threats: A business with disaster-proof data should never have to pay a ransom to get its data back. Anti-virus software catches only half of active threats. Backup is an essential part of defending against malicious viruses like ransomware. Secure backup enables you to recover clean data from a point in time so you can get back up and running Disaster-proof data can meet minimum security standards: More and more businesses are required by law to use advanced encryption for data both at rest and during transit. Many businesses require zero-knowledge security, where the business has sole ownership over the data encryption key. And finally, offsite datacenters must operate at the highest classification levels for security.

6 The recoverability of data
About half have had to recover data in the past year A data loss event would consume 81% of IT resources Recovery must be accomplished in 24 hours or less POLL: How many of you have had to recover data in the past year? When we asked IT pros from SpiceWorks, we found that: about half have had to recover data in the past year 71% said they have to recover data in less than 24 hours 57% said a data disaster would demand 100% of IT resources 46% said loss of productivity/efficiency is the biggest hurdle they face When it comes to recovering data, there are two aspects to consider: user productivity and admin productivity. User productivity: Data is only productive if users can access it. What’s your plan to maintain user access to data when there’s an interruption? Admin productivity: How much of a strain does data recovery cause you? If managing your disaster recovery solution is too cumbersome, it takes you away from other critical areas of the business. When data loss happens, IT productivity and efficiency grind to a halt

7 Three keys to data productivity
Only a solution designed for backup will keep data accessible in any scenario. There’s no recovery without backup Businesses need the tools to recover what you need where you need it. There’s no backup without recovery Any solution that takes IT away from key initiatives hurts productivity. There’s no resiliency without simplicity Your disaster recovery solution should be designed to improve your productivity as well as your users’. If a solution is designed for backup, it should: Work automatically in the background without interfering with normal workflow Have advanced settings for scheduling, policy management and bandwidth throttling. Use advanced technology to shorten backup windows and reduce your data footprint. If a solution is designed for recovery, it should: Give you options for both granular and system restore. Let you restore from either a local or offsite source. Be fast, efficient and support the your RTO/RPO targets. If a solution is easy to use, it should: Have a friendly and intuitive user interface. Allow you to manage and monitor backups centrally. Enable you to log in, securely, from anywhere.

8 Data protection services
Carbonite Safe Carbonite EVault Carbonite DoubleTake Backup Disaster recovery High availability Endpoint & servers Servers Servers Restore Failover HA Our traditional back up products, eventually will be known as “Carbonite Safe” Target RTO/RPO <24 Hours Minutes – hours Immediate – minutes Size Up to 1TB 1T – 50T Type Cloud/hybrid Cloud/hybrid/on-site Cloud/on-site

9 Endpoints & Some Virtualization
Small (1-99 empl; 10GB-1TB) Medium ( empl; 1TB-150TB) Large (1000+ emply; 1TB+) Downtime Hours None None Systems profile Endpoints & Some Virtualization Virtual/Cloud Virtual/Cloud Carbonite Safe Backup Endpoint backup Server Backup Carbonite E2 Carbonite EVault Carbonite DoubleTake DRaaS/ HA

10 Carbonite Safe Safe Backup
Cost effective computer & server backup and restore Safe Computer Backup Cloud based backup, easy to deploy across an organization Safe Backup Cloud & hybrid backup and restore options including software and appliance options Safe Server Backup Cloud & hybrid backup options – backup to appliance or another local device

11 Carbonite EVault EVault Backup
Cost effective disaster recovery for non-critical workloads EVault Cloud Backup Secondary copy secured in the EVault cloud EVault Backup Forever-incremental, encrypted and compressed backups with two deployment options EVault Hybrid Backup Appliance-based local copy – and secondary copy in the cloud

12 Carbonite EVault Choose systems you want to protect
Broad based platform support – easy to deploy, monitor, manage Choose systems you want to protect Create and deploy backup policies Monitor status for multiple systems

13 Carbonite DoubleTake DoubleTake
High availability and risk-free migration DoubleTake Availability Continuous replication and flexible failover for mission-critical systems DoubleTake Physical, virtual and cloud replication, automated to enable straightforward failover and risk-free migration DoubleTake Move Risk-free migration from any physical, virtual or cloud to any target system

14 Protect and physical, virtual, or cloud system to any target

15 Carbonite MailStore MailStore Modern email archiving as a service
MailStore Server Legal safe guards for compliance, in addition to saving up to 70% in storage space MailStore Creates 1:1 copies of all s in a central archive to ensure the security and availability of large amounts of data over a period of years. MailStore Home Backup all s in a central archive, even if distributed across multiple computers, programs or mailboxes

16 Thank you! Questions? Come by the booth!


Download ppt "Disaster happens; don’t be held hostage"

Similar presentations


Ads by Google