SlideShare a Scribd company logo
1 of 36
Break Out Session 3 Disaster Recovery and  Data Backup PRESENTED BY:  Kris Bushover, Spiceworks Inc Eric Osterholm, OuterNet
Session Overview ,[object Object],[object Object],[object Object],[object Object]
Backup – Why do it? ,[object Object],[object Object]
Backup – Why do it? ,[object Object],[object Object],[object Object]
Backup – Planning ,[object Object],[object Object]
Backup – Planning Can you recover it when you need it?
Backup – Planning Solutions fall into 3 tiers: User Snapshots, folder redirection Server Tape, Disk to disk, HSM, Virtualization Site Replication, Synthetic fulls
Backup – Planning ,[object Object],[object Object],[object Object]
Backup – Planning ,[object Object],[object Object],[object Object],[object Object],[object Object]
Backup – Planning ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Backup – Planning ,[object Object],[object Object]
Developing the Backup Plan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Developing the Backup Plan ,[object Object],[object Object],[object Object],[object Object]
Developing the Backup Plan ,[object Object],[object Object],[object Object],[object Object]
Developing the Backup Plan ,[object Object],[object Object],[object Object],[object Object]
Developing the Backup Plan ,[object Object],[object Object],[object Object],[object Object],[object Object]
Developing the Backup Plan ,[object Object],[object Object],[object Object],[object Object]
Developing the Backup Plan ,[object Object],[object Object],[object Object],[object Object],[object Object]
Developing the Backup Plan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Developing the Backup Plan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Developing the Backup Plan ,[object Object],[object Object],[object Object],[object Object],[object Object]
Developing the Backup Plan ,[object Object],[object Object],[object Object],[object Object],[object Object]
Developing the Backup Plan ,[object Object],[object Object],[object Object],[object Object],[object Object]
Developing the Backup Plan ,[object Object],[object Object],[object Object],[object Object],[object Object]
Developing the Backup Plan ,[object Object],[object Object],[object Object]
Developing the Backup Plan ,[object Object],[object Object],[object Object],[object Object],[object Object]
Developing the Backup Plan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Developing the Backup Plan ,[object Object],[object Object],[object Object],[object Object]
Developing the Backup Plan ,[object Object],[object Object],[object Object],[object Object]
Implement the Backup Plan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Implement the Backup Plan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Implement the Backup Plan ,[object Object],[object Object],[object Object],[object Object],[object Object]
Implement the Backup Plan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Implement the Backup Plan ,[object Object],[object Object],[object Object]
Implement the Backup Plan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions?

More Related Content

What's hot

Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
Arrow ECS UK
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
Randy Bowman
 
Network security policies
Network security policiesNetwork security policies
Network security policies
Usman Mukhtar
 

What's hot (20)

Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
 
Disaster Recovery Plan
Disaster Recovery Plan Disaster Recovery Plan
Disaster Recovery Plan
 
Commvault Story - CVTSP_1.pptx
Commvault Story - CVTSP_1.pptxCommvault Story - CVTSP_1.pptx
Commvault Story - CVTSP_1.pptx
 
Select enterprise backup software
Select enterprise backup softwareSelect enterprise backup software
Select enterprise backup software
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 
Backup & restore in windows
Backup & restore in windowsBackup & restore in windows
Backup & restore in windows
 
Disaster recovery
Disaster recoveryDisaster recovery
Disaster recovery
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfee
 
What is cloud backup?
What is cloud backup?What is cloud backup?
What is cloud backup?
 
Meeting Your Virtual RTO / RPO Objectives
Meeting Your Virtual RTO / RPO ObjectivesMeeting Your Virtual RTO / RPO Objectives
Meeting Your Virtual RTO / RPO Objectives
 
Network security policies
Network security policiesNetwork security policies
Network security policies
 
Disaster recovery solution
Disaster recovery solutionDisaster recovery solution
Disaster recovery solution
 
Information security – risk identification is all
Information security – risk identification is allInformation security – risk identification is all
Information security – risk identification is all
 
Threat Modelling
Threat ModellingThreat Modelling
Threat Modelling
 
Audit of it infrastructure
Audit of it infrastructureAudit of it infrastructure
Audit of it infrastructure
 
Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021
Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021
Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021
 

Similar to Disaster Recovery & Data Backup Strategies

8 considerations for evaluating disk based backup solutions
8 considerations for evaluating disk based backup solutions8 considerations for evaluating disk based backup solutions
8 considerations for evaluating disk based backup solutions
Servium
 
IT Backup & Restoration: Never Worry about a Late Backup Again
IT Backup & Restoration: Never Worry about a Late Backup AgainIT Backup & Restoration: Never Worry about a Late Backup Again
IT Backup & Restoration: Never Worry about a Late Backup Again
HelpSystems
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanCreating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery Plan
Rishu Mehra
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data  Disaster  Recovery  PlanCreating And Implementing A Data  Disaster  Recovery  Plan
Creating And Implementing A Data Disaster Recovery Plan
Rishu Mehra
 
2.6 backup and recovery
2.6 backup and recovery2.6 backup and recovery
2.6 backup and recovery
mrmwood
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - Notes
Kranthi
 
Not having a good backup
Not having a good backupNot having a good backup
Not having a good backup
Rita Crawford
 

Similar to Disaster Recovery & Data Backup Strategies (20)

Generic RLM White Paper
Generic RLM White PaperGeneric RLM White Paper
Generic RLM White Paper
 
8 considerations for evaluating disk based backup solutions
8 considerations for evaluating disk based backup solutions8 considerations for evaluating disk based backup solutions
8 considerations for evaluating disk based backup solutions
 
Backup Exec 21
Backup Exec 21Backup Exec 21
Backup Exec 21
 
IT Backup & Restoration: Never Worry about a Late Backup Again
IT Backup & Restoration: Never Worry about a Late Backup AgainIT Backup & Restoration: Never Worry about a Late Backup Again
IT Backup & Restoration: Never Worry about a Late Backup Again
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanCreating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery Plan
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data  Disaster  Recovery  PlanCreating And Implementing A Data  Disaster  Recovery  Plan
Creating And Implementing A Data Disaster Recovery Plan
 
Final Ucat Ppt
Final Ucat PptFinal Ucat Ppt
Final Ucat Ppt
 
2.6 backup and recovery
2.6 backup and recovery2.6 backup and recovery
2.6 backup and recovery
 
Tech comm presentation 2014 01-16
Tech comm presentation 2014 01-16Tech comm presentation 2014 01-16
Tech comm presentation 2014 01-16
 
Comp8 unit9c lecture_slides
Comp8 unit9c lecture_slidesComp8 unit9c lecture_slides
Comp8 unit9c lecture_slides
 
HP Storage Backup (RDX) presentation
HP Storage Backup (RDX) presentation HP Storage Backup (RDX) presentation
HP Storage Backup (RDX) presentation
 
Streamlining Backup: Enhancing Data Protection with Backup Appliances
Streamlining Backup: Enhancing Data Protection with Backup AppliancesStreamlining Backup: Enhancing Data Protection with Backup Appliances
Streamlining Backup: Enhancing Data Protection with Backup Appliances
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - Notes
 
Backup strategy plan
Backup strategy planBackup strategy plan
Backup strategy plan
 
Oaklands college: Protecting your data.
Oaklands college: Protecting your data.Oaklands college: Protecting your data.
Oaklands college: Protecting your data.
 
Not having a good backup
Not having a good backupNot having a good backup
Not having a good backup
 
Backup & recovery with rman
Backup & recovery with rmanBackup & recovery with rman
Backup & recovery with rman
 
Backup_exadata_update
Backup_exadata_updateBackup_exadata_update
Backup_exadata_update
 
Asset Management and Workflow
Asset Management and WorkflowAsset Management and Workflow
Asset Management and Workflow
 
Surveon Powerful Data Backup Solutions
Surveon Powerful Data Backup SolutionsSurveon Powerful Data Backup Solutions
Surveon Powerful Data Backup Solutions
 

More from Spiceworks

Checking your back ups without batting an eye
Checking your back ups without batting an eyeChecking your back ups without batting an eye
Checking your back ups without batting an eye
Spiceworks
 
SpiceWorld London 2012 presentation Eaton
SpiceWorld London 2012 presentation EatonSpiceWorld London 2012 presentation Eaton
SpiceWorld London 2012 presentation Eaton
Spiceworks
 
Spice world london 2012 Grey Howe
Spice world london 2012 Grey HoweSpice world london 2012 Grey Howe
Spice world london 2012 Grey Howe
Spiceworks
 
Spice world london 2012 Ben Snape
Spice world london 2012 Ben SnapeSpice world london 2012 Ben Snape
Spice world london 2012 Ben Snape
Spiceworks
 
Introducing....Office 365
Introducing....Office 365Introducing....Office 365
Introducing....Office 365
Spiceworks
 

More from Spiceworks (20)

Checking your back ups without batting an eye
Checking your back ups without batting an eyeChecking your back ups without batting an eye
Checking your back ups without batting an eye
 
SpiceWorld London 2012 presentation Eaton
SpiceWorld London 2012 presentation EatonSpiceWorld London 2012 presentation Eaton
SpiceWorld London 2012 presentation Eaton
 
Spice world london 2012 Grey Howe
Spice world london 2012 Grey HoweSpice world london 2012 Grey Howe
Spice world london 2012 Grey Howe
 
Spice world london 2012 Ben Snape
Spice world london 2012 Ben SnapeSpice world london 2012 Ben Snape
Spice world london 2012 Ben Snape
 
SpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu JaegerSpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu Jaeger
 
EatonVirtualization, Connectivity and the Cloud — Trends Driving the Future o...
EatonVirtualization, Connectivity and the Cloud — Trends Driving the Future o...EatonVirtualization, Connectivity and the Cloud — Trends Driving the Future o...
EatonVirtualization, Connectivity and the Cloud — Trends Driving the Future o...
 
Bringing Patch Management to Spiceworks
Bringing Patch Management to SpiceworksBringing Patch Management to Spiceworks
Bringing Patch Management to Spiceworks
 
Introducing....Office 365
Introducing....Office 365Introducing....Office 365
Introducing....Office 365
 
Making Sense of the Cloud
Making Sense of the CloudMaking Sense of the Cloud
Making Sense of the Cloud
 
Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...
Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...
Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...
 
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
 
Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...
Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...
Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...
 
Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...
Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...
Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...
 
Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...
Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...
Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...
 
A Whole New Way to Keep Track of Your People & IT Purchasing - Justin Perkins...
A Whole New Way to Keep Track of Your People & IT Purchasing - Justin Perkins...A Whole New Way to Keep Track of Your People & IT Purchasing - Justin Perkins...
A Whole New Way to Keep Track of Your People & IT Purchasing - Justin Perkins...
 
Going the Extra Mile in Network Monitoring & Management - Greg Kattawar, Spic...
Going the Extra Mile in Network Monitoring & Management - Greg Kattawar, Spic...Going the Extra Mile in Network Monitoring & Management - Greg Kattawar, Spic...
Going the Extra Mile in Network Monitoring & Management - Greg Kattawar, Spic...
 
Getting More Nitty-gritty Details on Your Network - Brian Gugliemetti, Spicew...
Getting More Nitty-gritty Details on Your Network - Brian Gugliemetti, Spicew...Getting More Nitty-gritty Details on Your Network - Brian Gugliemetti, Spicew...
Getting More Nitty-gritty Details on Your Network - Brian Gugliemetti, Spicew...
 
Keep IT Simple (& Get IT All Done!) with Spiceworks - Paul Luciano, Expand In...
Keep IT Simple (& Get IT All Done!) with Spiceworks - Paul Luciano, Expand In...Keep IT Simple (& Get IT All Done!) with Spiceworks - Paul Luciano, Expand In...
Keep IT Simple (& Get IT All Done!) with Spiceworks - Paul Luciano, Expand In...
 
How to Take an Enterprise Approach in a SMB World - Jeff Shuron, Sports Physi...
How to Take an Enterprise Approach in a SMB World - Jeff Shuron, Sports Physi...How to Take an Enterprise Approach in a SMB World - Jeff Shuron, Sports Physi...
How to Take an Enterprise Approach in a SMB World - Jeff Shuron, Sports Physi...
 
Using Spiceworks for Change Control - Justin Davison, R J Lee Group
Using Spiceworks for Change Control - Justin Davison, R J Lee GroupUsing Spiceworks for Change Control - Justin Davison, R J Lee Group
Using Spiceworks for Change Control - Justin Davison, R J Lee Group
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 

Disaster Recovery & Data Backup Strategies

  • 1. Break Out Session 3 Disaster Recovery and Data Backup PRESENTED BY: Kris Bushover, Spiceworks Inc Eric Osterholm, OuterNet
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. Backup – Planning Can you recover it when you need it?
  • 7. Backup – Planning Solutions fall into 3 tiers: User Snapshots, folder redirection Server Tape, Disk to disk, HSM, Virtualization Site Replication, Synthetic fulls
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.

Editor's Notes

  1. Myriad Pro Regular 48pt Presented By:  Myriad Pro Semibold 30pt (all caps) Presenter: Myriad Pro Semibold 48pt Company: Myriad Pro Regular 48pt Date: Myriad Pro Regular 24pt