SlideShare una empresa de Scribd logo
1 de 42
Welcome to the
Disaster Recovery Webinar
Presenters:
Steven Nichols, Director Business Development 303-383-1627 x 1104
Sean McDonald, Director IT Services 303-383-1627 x 1011
Aaron Johnson, Senior Account Manager 801-758-1045
How to use the
webinar interface
DR@mcstech.net
www.MCStech.net
What we will cover
What is Disaster Recovery
Nature of Disasters
Disaster Recovery planning
Why Develop a plan
What goes into a plan
Backup solutions
How to respond to a disaster
45 minutes presentation
Q&A
Disaster Recovery/
Hosted Backup Luncheon
When: Wednesday, April 28th
12:00 – 1:00
Where: Denver Chop House
1735 19th Street
What: Hosted backup and
formal disaster
recovery planning
luncheon for more
technical users
To register, call, email
303-383-1627 x 1104
dr@mcstech.net
Business Continuity Planning
Disaster
Recovery
How to respond to the unthinkable
Types of IT disasters
• Disk corruption, power surges, accidental
damageHardware failure
• Stolen laptops, USB drives, servers,
workstationsTheft of hardware
• Disgruntled employees, viruses, hackers
Malicious
destruction
• Smoke damage, fire sprinklers, total lossFire
• Floods, earthquakes, violence, volcanoes
Things that make
the news
37%
26%
14%
13%
10%
Frequency of Disasters
Hardware failure
Viruses and hackers
Natural Disasters,
Fire, Floods
Malicious Employee
behavior
Man made disasters
Disaster Recovery planning
Why
disaster
recovery
planning
is
important
Writing a
formal
document
Choosing
the right
pieces
Backup
solutions
Businesses with disaster recovery plans are
more likely to survive disasters
Compliance
with HIPAA,
SOX
Good
Business
Governance
Small
investment
for huge
return
6 % of companies suffering from a
catastrophic data loss will survive.
43 % never reopen
51 % close within two years.
-University of Texas
Why is it so hard to survive a loss?
Complexity of networkData is the company Time is Money
Order servers 0-6 days
Build network 2-3 days
Reload Data 1-3 days
Disaster Recovery planning
Why
disaster
recovery
planning
is
important
Writing a
formal
document
Choosing
the right
pieces
Backup
solutions
Right!Wrong!
Where should you keep your plan?
Electronically? Printed out?
What goes in the plan
Contact
information
Employees
Vendors
(especially
backup
vendors)
Key customers
Definition of
responsibilities
Who declares a
disaster
Who orders the
new hardware
Who initiates
the phone tree
Budget & roadmap
for rebuilding
network
Hardware
quotes or
estimates
Plan for
restoring
software
Directions and
schedule for
rebuilding
Full
documentation of
existing system
Hardware
specifications
and layout
Software
layout and
serial numbers
Network design
Disaster Recovery planning
Why
disaster
recovery
planning
is
important
Writing a
formal
document
Choosing
the right
pieces
Backup
solutions
Budget
Time to
Recovery
Recovery
Point
Recovery Point
How
should IT
look after
recovery?
Is Identical
necessary or
desirable?
Is there a rally
point between
entirely down
and ideal?
Recovery of
data vs.
simple ability
to move
forward
Can any data
be lost?
Compliance
considerations
Time to recovery
System 8 hours 24 hours 48 hours 96 hours 1 week
Internet
Access
Partial
Functionality Fully Functional
Phones
Partial
Functionality Fully Functional
Workstations Down Partial Functionality Fully Functional
Network Down
Partial
Functionality Fully Functional
File Share
Server Down
Partial
Functionality Fully Functional
Email Server Down Fully Functional
Applications
Server Down Partial Functionality
Fully
Functional
Synchronize your needs and abilities
Business
needs
Equipment
availability
Human
availability
Budget
Pre-disaster
expenses
On-going
cost (mostly
backup)
Initial cost
in hours and
hardware
Post-disaster
expenses
Hardware
Software
Expense of
being down,
lost revenue
Disaster Recovery planning
Why
disaster
recovery
planning
is
important
Writing a
formal
document
Choosing
the right
pieces
Backup
solutions
Backup solutions
USB
Backup
Tape
Backup
Hosted
Disk / Disk
Backup
USB Backup
Pros Cons
Tape Back-up
Pros Cons
Hosted Disk / Disk
Pros Cons
Storage in the Cloud: The Future is Now?
i365, A Seagate Company
Subsidiary of
Seagate
Technology,
a $13B
Company
22,000
Satisfied
Small, Mid-
Size and
Large
Enterprise
Customers
Over 500
employees
Operating in
US, Canada,
and Europe
Member
Microsoft
Global ISV
program
• All data replicated to multiple geographies
• Comprehensive DR plans for every data center
• Redundant Internet connectivity
10 high availability Type IV certified data centers
• SAS-70 Type II Audited
• ISO 9001 Certified Data Restoration/Migration Labs
• ISO 27001 security management program
• Data encrypted at all times (at rest and in motion)
Best in class secure and scalable
Internal Challenges
Technology
Dependence
Explosive Data
Growth
Application
growth
Data retention
Customer
correspondence
Limited
Resources
Managing more
devices,
projects, people
Supporting
distributed
environments
Supporting
mobile
workforce
Telecommuting,
locations
Employee
Expectations
Longer
production days
On-demand
culture
Protect
investments
Business
Plans
Mergers,
Acquisitions,
Expansion
Integrating
environments
Standardizing
key policies
External Challenges
Customers -
Litigation Culture
• Customer
expectations
• Sensitive
personal
information
• Protect your
company brand
• Identity theft
Government -
Regulatory
Compliance
• Confidentiality
• Security
requirements
• Accessibility
• Retention
policies
Preparing for the
unexpected
• High cost of
downtime
• Assessing risks
• Solidify disaster
recovery plans
Traditional Backup Process
Tape Vaulting Service
(e.g. Iron Mountain, Recall, etc.)
Backup Software
(Symantec, CA, IBM, etc.)
Potential for Operating Inefficiencies
Traditional Recovery Process
Tapes are sent from
vaulting warehouse
Tapes are delivered back to the
company requesting them.
Cannot keep up with business pressures
32
or
EVault Software
Security Measures
Controlled Environment:
 Administrative rights, centralization, automated, eliminate unreliable third
party transport services
Software Security:
 Data is encrypted end to end. Customer chooses between 56-bit Blowfish,
56-bit DES, 112-bit Triple-DES, 128-bit Blowfish, 256 and 128-bit AES
encryption levels
 Customer is the sole owner of the encryption key – even EVault cannot
access the data
 EVault DeltaPro™, is a self-encrypting process, adding an additional level of
security
 SAS 70 Type II certified
Hardware Security:
 Best of breed hardware (EMC, Dell, HP, Nexsan)
 Preemptive predictable monitoring
 RAID 5+ redundancy built in
Facility Security Measures
SunGard,
Seagate
Security key
card access only
24 x 7 security
guard
Facility video
surveillance
Private, locked,
caged vault
space
Redundant
power supply
Redundant
Internet
connectivity
Advanced fire
detection and
fire suppression
systems
Humidity and
water detection
systems
Climate
controlled
EVault Recovery Process
Recovery Scenarios Recovery Options
• Online point-and-click for full recovery of
files and folders via IPLost files and folders
• Rebuild servers directly off mass storage
device, ship to off-site location, if necessaryBare-metal restores, server
rebuilds, OS upgrades
• Data resides in hot site facility
• EVault Protect QuickShipSM mobile vault for
high-level restores
• On-site professional services available to
assist in recovery process
Full environment
recovery, System
State, Data files
Enterprise Customers
Recovering from a Disaster
Recognize a disaster exists
Martial your forces
Follow the plan
• Evaluate current systems,
backups, policies,
documentation
• Recommendations for
improvement
• Matching budget with
expectations and risk
Disaster Recovery
Assessment
• Gather the contact
information
• Decide on elements to
include (backup)
• Build directions and
budget
Develop a formal
plan • Print out copies of the
plan
• Install systems
• Test, and evaluate
Execute the plan
Disaster Recovery/
Hosted Backup Luncheon
When: Wednesday, April 28th
12:00 – 1:00
Where: Denver Chop House
1735 19th Street
What: Hosted backup and
formal disaster
recovery planning
luncheon for more
technical users
To register, call
303-383-1627 x 1104
Questions?
Presenters:
Steven Nichols, Director Business Development 303-383-1627 x 1104
Sean McDonald, Director IT Services 303-383-1627 x 1011
Aaron Johnson, Senior Account Manager 801-758-1045
Steven Nichols
303-383-1627 xtn: 1104
dr@mcstech.net
Disaster Recovery Assessments are
½ price until May 15th
Disaster
Recovery
Assessment
Evaluate current
systems, backups,
policies,
documentation
Recommendations
for improvement
Matching budget
with expectations
and risk

Más contenido relacionado

Último

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Último (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Destacado

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 

Destacado (20)

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 

Disaster Recovery

  • 1. Welcome to the Disaster Recovery Webinar Presenters: Steven Nichols, Director Business Development 303-383-1627 x 1104 Sean McDonald, Director IT Services 303-383-1627 x 1011 Aaron Johnson, Senior Account Manager 801-758-1045
  • 2. How to use the webinar interface DR@mcstech.net
  • 4. What we will cover What is Disaster Recovery Nature of Disasters Disaster Recovery planning Why Develop a plan What goes into a plan Backup solutions How to respond to a disaster 45 minutes presentation Q&A
  • 5. Disaster Recovery/ Hosted Backup Luncheon When: Wednesday, April 28th 12:00 – 1:00 Where: Denver Chop House 1735 19th Street What: Hosted backup and formal disaster recovery planning luncheon for more technical users To register, call, email 303-383-1627 x 1104 dr@mcstech.net
  • 7. Types of IT disasters • Disk corruption, power surges, accidental damageHardware failure • Stolen laptops, USB drives, servers, workstationsTheft of hardware • Disgruntled employees, viruses, hackers Malicious destruction • Smoke damage, fire sprinklers, total lossFire • Floods, earthquakes, violence, volcanoes Things that make the news
  • 8. 37% 26% 14% 13% 10% Frequency of Disasters Hardware failure Viruses and hackers Natural Disasters, Fire, Floods Malicious Employee behavior Man made disasters
  • 9. Disaster Recovery planning Why disaster recovery planning is important Writing a formal document Choosing the right pieces Backup solutions
  • 10. Businesses with disaster recovery plans are more likely to survive disasters Compliance with HIPAA, SOX Good Business Governance Small investment for huge return 6 % of companies suffering from a catastrophic data loss will survive. 43 % never reopen 51 % close within two years. -University of Texas
  • 11. Why is it so hard to survive a loss? Complexity of networkData is the company Time is Money Order servers 0-6 days Build network 2-3 days Reload Data 1-3 days
  • 12. Disaster Recovery planning Why disaster recovery planning is important Writing a formal document Choosing the right pieces Backup solutions
  • 13. Right!Wrong! Where should you keep your plan? Electronically? Printed out?
  • 14. What goes in the plan Contact information Employees Vendors (especially backup vendors) Key customers Definition of responsibilities Who declares a disaster Who orders the new hardware Who initiates the phone tree Budget & roadmap for rebuilding network Hardware quotes or estimates Plan for restoring software Directions and schedule for rebuilding Full documentation of existing system Hardware specifications and layout Software layout and serial numbers Network design
  • 15. Disaster Recovery planning Why disaster recovery planning is important Writing a formal document Choosing the right pieces Backup solutions
  • 17. Recovery Point How should IT look after recovery? Is Identical necessary or desirable? Is there a rally point between entirely down and ideal? Recovery of data vs. simple ability to move forward Can any data be lost? Compliance considerations
  • 18. Time to recovery System 8 hours 24 hours 48 hours 96 hours 1 week Internet Access Partial Functionality Fully Functional Phones Partial Functionality Fully Functional Workstations Down Partial Functionality Fully Functional Network Down Partial Functionality Fully Functional File Share Server Down Partial Functionality Fully Functional Email Server Down Fully Functional Applications Server Down Partial Functionality Fully Functional
  • 19. Synchronize your needs and abilities Business needs Equipment availability Human availability
  • 20. Budget Pre-disaster expenses On-going cost (mostly backup) Initial cost in hours and hardware Post-disaster expenses Hardware Software Expense of being down, lost revenue
  • 21. Disaster Recovery planning Why disaster recovery planning is important Writing a formal document Choosing the right pieces Backup solutions
  • 25. Hosted Disk / Disk Pros Cons
  • 26. Storage in the Cloud: The Future is Now?
  • 27. i365, A Seagate Company Subsidiary of Seagate Technology, a $13B Company 22,000 Satisfied Small, Mid- Size and Large Enterprise Customers Over 500 employees Operating in US, Canada, and Europe Member Microsoft Global ISV program • All data replicated to multiple geographies • Comprehensive DR plans for every data center • Redundant Internet connectivity 10 high availability Type IV certified data centers • SAS-70 Type II Audited • ISO 9001 Certified Data Restoration/Migration Labs • ISO 27001 security management program • Data encrypted at all times (at rest and in motion) Best in class secure and scalable
  • 28. Internal Challenges Technology Dependence Explosive Data Growth Application growth Data retention Customer correspondence Limited Resources Managing more devices, projects, people Supporting distributed environments Supporting mobile workforce Telecommuting, locations Employee Expectations Longer production days On-demand culture Protect investments Business Plans Mergers, Acquisitions, Expansion Integrating environments Standardizing key policies
  • 29. External Challenges Customers - Litigation Culture • Customer expectations • Sensitive personal information • Protect your company brand • Identity theft Government - Regulatory Compliance • Confidentiality • Security requirements • Accessibility • Retention policies Preparing for the unexpected • High cost of downtime • Assessing risks • Solidify disaster recovery plans
  • 30. Traditional Backup Process Tape Vaulting Service (e.g. Iron Mountain, Recall, etc.) Backup Software (Symantec, CA, IBM, etc.) Potential for Operating Inefficiencies
  • 31. Traditional Recovery Process Tapes are sent from vaulting warehouse Tapes are delivered back to the company requesting them. Cannot keep up with business pressures
  • 32. 32 or
  • 34. Security Measures Controlled Environment:  Administrative rights, centralization, automated, eliminate unreliable third party transport services Software Security:  Data is encrypted end to end. Customer chooses between 56-bit Blowfish, 56-bit DES, 112-bit Triple-DES, 128-bit Blowfish, 256 and 128-bit AES encryption levels  Customer is the sole owner of the encryption key – even EVault cannot access the data  EVault DeltaPro™, is a self-encrypting process, adding an additional level of security  SAS 70 Type II certified Hardware Security:  Best of breed hardware (EMC, Dell, HP, Nexsan)  Preemptive predictable monitoring  RAID 5+ redundancy built in
  • 35. Facility Security Measures SunGard, Seagate Security key card access only 24 x 7 security guard Facility video surveillance Private, locked, caged vault space Redundant power supply Redundant Internet connectivity Advanced fire detection and fire suppression systems Humidity and water detection systems Climate controlled
  • 36. EVault Recovery Process Recovery Scenarios Recovery Options • Online point-and-click for full recovery of files and folders via IPLost files and folders • Rebuild servers directly off mass storage device, ship to off-site location, if necessaryBare-metal restores, server rebuilds, OS upgrades • Data resides in hot site facility • EVault Protect QuickShipSM mobile vault for high-level restores • On-site professional services available to assist in recovery process Full environment recovery, System State, Data files
  • 38. Recovering from a Disaster Recognize a disaster exists Martial your forces Follow the plan
  • 39. • Evaluate current systems, backups, policies, documentation • Recommendations for improvement • Matching budget with expectations and risk Disaster Recovery Assessment • Gather the contact information • Decide on elements to include (backup) • Build directions and budget Develop a formal plan • Print out copies of the plan • Install systems • Test, and evaluate Execute the plan
  • 40. Disaster Recovery/ Hosted Backup Luncheon When: Wednesday, April 28th 12:00 – 1:00 Where: Denver Chop House 1735 19th Street What: Hosted backup and formal disaster recovery planning luncheon for more technical users To register, call 303-383-1627 x 1104
  • 41. Questions? Presenters: Steven Nichols, Director Business Development 303-383-1627 x 1104 Sean McDonald, Director IT Services 303-383-1627 x 1011 Aaron Johnson, Senior Account Manager 801-758-1045
  • 42. Steven Nichols 303-383-1627 xtn: 1104 dr@mcstech.net Disaster Recovery Assessments are ½ price until May 15th Disaster Recovery Assessment Evaluate current systems, backups, policies, documentation Recommendations for improvement Matching budget with expectations and risk

Notas del editor

  1. Welcome to the Mission Critical Systems Disaster Recovery Webinar. Thank you for coming. Presenters.
  2. Slider Bar to hide the control panel::: Audio::: Questions::: If all else fails, or you’re pulled away, email for copy:::
  3. IT Management::: SharePoint Development::: Training Calendar:::
  4. Disaster Recovery from a more formal perspective, and hosted backup solutions.
  5. DR part of business continuity planning. SEAN
  6. Types of disastersMost people think of fire, but hardware failure and malicious behavior are more common. SEAN
  7. Each business’s threat matrix looks different.Hardware failure is very common SEAN STEVEN - Malicious behavior does happen to small businesses. “40% of small to medium businesses that manage their nown network annd use the Internet for more than e-mail will have their network accessed by a hacker, and more that 50% won’t even know they were attacked” Gartner Group.Client with foreign language videos on her server.Lose a Laptop at Starbucks
  8. First step is to create a formal Disaster Recovery Plan.
  9. Why are IT disasters so catastrophic?Knowledge / Information companyEven simple networks take time to set up. ******Hit Animation******Disaster Recovery is about minimizing this time.
  10. SEAN
  11. 1) Recovery Point::: 2) Time to Recovery::: 3) Budget:::
  12. SEAN
  13. STEVEN
  14. If a server won’t be available for 4 days, what can be done in the mean time?What functions of the business need to be working first? What can wait until later?Make the most of your employees.Conversation between Sean and Steven
  15. BudgetSTEVEN
  16. STEVEN – Define ProductSEAN – Pros and Cons
  17. STEVEN – Define ProductSEAN – Pros and Cons
  18. STEVEN – Define ProductSEAN – Pros and Cons