Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Disaster Recovery
1. Welcome to the
Disaster Recovery Webinar
Presenters:
Steven Nichols, Director Business Development 303-383-1627 x 1104
Sean McDonald, Director IT Services 303-383-1627 x 1011
Aaron Johnson, Senior Account Manager 801-758-1045
2. How to use the
webinar interface
DR@mcstech.net
4. What we will cover
What is Disaster Recovery
Nature of Disasters
Disaster Recovery planning
Why Develop a plan
What goes into a plan
Backup solutions
How to respond to a disaster
45 minutes presentation
Q&A
5. Disaster Recovery/
Hosted Backup Luncheon
When: Wednesday, April 28th
12:00 – 1:00
Where: Denver Chop House
1735 19th Street
What: Hosted backup and
formal disaster
recovery planning
luncheon for more
technical users
To register, call, email
303-383-1627 x 1104
dr@mcstech.net
7. Types of IT disasters
• Disk corruption, power surges, accidental
damageHardware failure
• Stolen laptops, USB drives, servers,
workstationsTheft of hardware
• Disgruntled employees, viruses, hackers
Malicious
destruction
• Smoke damage, fire sprinklers, total lossFire
• Floods, earthquakes, violence, volcanoes
Things that make
the news
10. Businesses with disaster recovery plans are
more likely to survive disasters
Compliance
with HIPAA,
SOX
Good
Business
Governance
Small
investment
for huge
return
6 % of companies suffering from a
catastrophic data loss will survive.
43 % never reopen
51 % close within two years.
-University of Texas
11. Why is it so hard to survive a loss?
Complexity of networkData is the company Time is Money
Order servers 0-6 days
Build network 2-3 days
Reload Data 1-3 days
14. What goes in the plan
Contact
information
Employees
Vendors
(especially
backup
vendors)
Key customers
Definition of
responsibilities
Who declares a
disaster
Who orders the
new hardware
Who initiates
the phone tree
Budget & roadmap
for rebuilding
network
Hardware
quotes or
estimates
Plan for
restoring
software
Directions and
schedule for
rebuilding
Full
documentation of
existing system
Hardware
specifications
and layout
Software
layout and
serial numbers
Network design
17. Recovery Point
How
should IT
look after
recovery?
Is Identical
necessary or
desirable?
Is there a rally
point between
entirely down
and ideal?
Recovery of
data vs.
simple ability
to move
forward
Can any data
be lost?
Compliance
considerations
18. Time to recovery
System 8 hours 24 hours 48 hours 96 hours 1 week
Internet
Access
Partial
Functionality Fully Functional
Phones
Partial
Functionality Fully Functional
Workstations Down Partial Functionality Fully Functional
Network Down
Partial
Functionality Fully Functional
File Share
Server Down
Partial
Functionality Fully Functional
Email Server Down Fully Functional
Applications
Server Down Partial Functionality
Fully
Functional
19. Synchronize your needs and abilities
Business
needs
Equipment
availability
Human
availability
27. i365, A Seagate Company
Subsidiary of
Seagate
Technology,
a $13B
Company
22,000
Satisfied
Small, Mid-
Size and
Large
Enterprise
Customers
Over 500
employees
Operating in
US, Canada,
and Europe
Member
Microsoft
Global ISV
program
• All data replicated to multiple geographies
• Comprehensive DR plans for every data center
• Redundant Internet connectivity
10 high availability Type IV certified data centers
• SAS-70 Type II Audited
• ISO 9001 Certified Data Restoration/Migration Labs
• ISO 27001 security management program
• Data encrypted at all times (at rest and in motion)
Best in class secure and scalable
28. Internal Challenges
Technology
Dependence
Explosive Data
Growth
Application
growth
Data retention
Customer
correspondence
Limited
Resources
Managing more
devices,
projects, people
Supporting
distributed
environments
Supporting
mobile
workforce
Telecommuting,
locations
Employee
Expectations
Longer
production days
On-demand
culture
Protect
investments
Business
Plans
Mergers,
Acquisitions,
Expansion
Integrating
environments
Standardizing
key policies
29. External Challenges
Customers -
Litigation Culture
• Customer
expectations
• Sensitive
personal
information
• Protect your
company brand
• Identity theft
Government -
Regulatory
Compliance
• Confidentiality
• Security
requirements
• Accessibility
• Retention
policies
Preparing for the
unexpected
• High cost of
downtime
• Assessing risks
• Solidify disaster
recovery plans
30. Traditional Backup Process
Tape Vaulting Service
(e.g. Iron Mountain, Recall, etc.)
Backup Software
(Symantec, CA, IBM, etc.)
Potential for Operating Inefficiencies
31. Traditional Recovery Process
Tapes are sent from
vaulting warehouse
Tapes are delivered back to the
company requesting them.
Cannot keep up with business pressures
34. Security Measures
Controlled Environment:
Administrative rights, centralization, automated, eliminate unreliable third
party transport services
Software Security:
Data is encrypted end to end. Customer chooses between 56-bit Blowfish,
56-bit DES, 112-bit Triple-DES, 128-bit Blowfish, 256 and 128-bit AES
encryption levels
Customer is the sole owner of the encryption key – even EVault cannot
access the data
EVault DeltaPro™, is a self-encrypting process, adding an additional level of
security
SAS 70 Type II certified
Hardware Security:
Best of breed hardware (EMC, Dell, HP, Nexsan)
Preemptive predictable monitoring
RAID 5+ redundancy built in
35. Facility Security Measures
SunGard,
Seagate
Security key
card access only
24 x 7 security
guard
Facility video
surveillance
Private, locked,
caged vault
space
Redundant
power supply
Redundant
Internet
connectivity
Advanced fire
detection and
fire suppression
systems
Humidity and
water detection
systems
Climate
controlled
36. EVault Recovery Process
Recovery Scenarios Recovery Options
• Online point-and-click for full recovery of
files and folders via IPLost files and folders
• Rebuild servers directly off mass storage
device, ship to off-site location, if necessaryBare-metal restores, server
rebuilds, OS upgrades
• Data resides in hot site facility
• EVault Protect QuickShipSM mobile vault for
high-level restores
• On-site professional services available to
assist in recovery process
Full environment
recovery, System
State, Data files
38. Recovering from a Disaster
Recognize a disaster exists
Martial your forces
Follow the plan
39. • Evaluate current systems,
backups, policies,
documentation
• Recommendations for
improvement
• Matching budget with
expectations and risk
Disaster Recovery
Assessment
• Gather the contact
information
• Decide on elements to
include (backup)
• Build directions and
budget
Develop a formal
plan • Print out copies of the
plan
• Install systems
• Test, and evaluate
Execute the plan
40. Disaster Recovery/
Hosted Backup Luncheon
When: Wednesday, April 28th
12:00 – 1:00
Where: Denver Chop House
1735 19th Street
What: Hosted backup and
formal disaster
recovery planning
luncheon for more
technical users
To register, call
303-383-1627 x 1104
41. Questions?
Presenters:
Steven Nichols, Director Business Development 303-383-1627 x 1104
Sean McDonald, Director IT Services 303-383-1627 x 1011
Aaron Johnson, Senior Account Manager 801-758-1045
42. Steven Nichols
303-383-1627 xtn: 1104
dr@mcstech.net
Disaster Recovery Assessments are
½ price until May 15th
Disaster
Recovery
Assessment
Evaluate current
systems, backups,
policies,
documentation
Recommendations
for improvement
Matching budget
with expectations
and risk
Notas del editor
Welcome to the Mission Critical Systems Disaster Recovery Webinar. Thank you for coming. Presenters.
Slider Bar to hide the control panel::: Audio::: Questions::: If all else fails, or you’re pulled away, email for copy:::
IT Management::: SharePoint Development::: Training Calendar:::
Disaster Recovery from a more formal perspective, and hosted backup solutions.
DR part of business continuity planning. SEAN
Types of disastersMost people think of fire, but hardware failure and malicious behavior are more common. SEAN
Each business’s threat matrix looks different.Hardware failure is very common SEAN STEVEN - Malicious behavior does happen to small businesses. “40% of small to medium businesses that manage their nown network annd use the Internet for more than e-mail will have their network accessed by a hacker, and more that 50% won’t even know they were attacked” Gartner Group.Client with foreign language videos on her server.Lose a Laptop at Starbucks
First step is to create a formal Disaster Recovery Plan.
Why are IT disasters so catastrophic?Knowledge / Information companyEven simple networks take time to set up. ******Hit Animation******Disaster Recovery is about minimizing this time.
SEAN
1) Recovery Point::: 2) Time to Recovery::: 3) Budget:::
SEAN
STEVEN
If a server won’t be available for 4 days, what can be done in the mean time?What functions of the business need to be working first? What can wait until later?Make the most of your employees.Conversation between Sean and Steven