SlideShare a Scribd company logo
1 of 26
Don’t Backup
Don’t Backup - Recover
Recovery Strategies
Ray ‘Sugar’ Barber
Product Marketing
Disasters
Why you need a plan
Why you need a plan
What's the difference?
“Scenario planning is never a pleasant exercise.
However, CEOs owe it to their employees, their
families and to shareholders to protect their
most valuable assets -- their people -- and to
ensure that business can continue even under
the extreme circumstances. Disaster planning
should be on the agenda of every corporate
board meeting.”
Chuck Taylor, Gartner exec vice president and research director
What's the difference?
Leading Causes of Disaster
Hardware or OS
Malfunction
44%
Human Error
32%
Software Error
14%
Viruses
7%
Natural Disasters
3%
Jon William Toigo, Disaster Recovery Planning
What's your plan?
Do NOT Backup
Backup?
Recover
What’s in the plan
Cost of down time
Tiers of Data
Level of Resilience
Outage cost by industry
Ponemon Institute© Research Report, FEB 2011
Calculate your cost
LABOR COST = P x A x C x H
Where:
P = number of people affected
A = average percentage they are affected
C = average employee cost per hour
H = number of hours of outage
Calculate your cost
LOST REVENUE = (GR/TH) x I x H
Where:
GR = gross yearly revenue
TH = total yearly business hours
I = percentage impact
H = number of hours of outage
Where’s the cost?
Ponemon Institute© Research Report, FEB 2011
Tiers of Data
Level of Resilience
Site
D.C.
System
File
Spectrum of Recovery
• RTO - the maximum amount of time that data
can be unavailable before impacting business
integrity
• RPO - the acceptable level of data loss that
does not compromise operations or
compliance.
50-60
40-50
30-40
20-30
10-20
0-10
RTO
RPO
Local Imaging
File based
Hot swap
Live Replication
Replication
Hybrid Cloud
Spectrum of Recovery
Automation
Conclusion
Understand your Spectrum of Recovery
Build your restore scenarios
Plan
Cost of Downtime
Tiers of Data
Level of Resilience
Part 2 - Companion Session:
“Pick a disaster… any disaster”
Wednesday 10:40am - Acacia 2
ray.barber@kaseya.com

More Related Content

More from Kaseya

More from Kaseya (20)

Advanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementAdvanced Administration: Mobile Device Management
Advanced Administration: Mobile Device Management
 
Advanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseAdvanced Administration: Kaseya Traverse
Advanced Administration: Kaseya Traverse
 
Advanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteAdvanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD Suite
 
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
 
Security and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionSecurity and Backup II: Vision and Direction
Security and Backup II: Vision and Direction
 
Security and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureSecurity and Backup I: OEM Architecture
Security and Backup I: OEM Architecture
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite Overview
 
Kaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya Asset Discovery Overview
Kaseya Asset Discovery Overview
 
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationAutomation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
 
Kaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner Landscape
 
Advanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorAdvanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual Administrator
 
Kaseya Corporate Update and Roadmap Q1 2014
Kaseya Corporate Update and Roadmap Q1 2014Kaseya Corporate Update and Roadmap Q1 2014
Kaseya Corporate Update and Roadmap Q1 2014
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management
 
Kaseya BYOD Suite
Kaseya BYOD SuiteKaseya BYOD Suite
Kaseya BYOD Suite
 
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...
 
Making Money in the Cloud Part II…Is Your MSP Team Ready?
Making Money in the Cloud   Part II…Is Your MSP Team Ready?Making Money in the Cloud   Part II…Is Your MSP Team Ready?
Making Money in the Cloud Part II…Is Your MSP Team Ready?
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy
 
Systems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed NetworksSystems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed Networks
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Kaseya Connect 2013: Dont Back up - Recover

Editor's Notes

  1. Hi everyone, I'm here to tell you why you don't need to backupHappy Birthday
  2. ----- Meeting Notes (30/04/2013 13:57) -----talk instead about recovery strategies, how you get to them and how they map to your business
  3. IN homage to our amazing keynote speaker this morning mr Sugar Ray Lenonar who talked to us about focus and determination to get to your desired outcome.
  4. Nobody likes to think about disasters, but like them or not they happen. Even when you know there is risk involved in something it can be easy to dismiss it and not take the necessary precautions. Its part of our upbeat human nature that we don’t want to have to think about what might go wrong, we like to spend our time thinking about how we’re going to improve things.1min
  5. Unfortunately the fact of the matter is that we are all exposed to risk, there are very few ‘safe’ places to be found. Actually we’re all in one of the few spots in the USA where there are no known natural disaster threats – as long as you don’t count dehydration!1min
  6. Presidential World Map of natural riskThere aren’t many safe places on earthIn SouthAmerica – Suriname, French GuianaLook around EMEA, this map doesn’t include, terrorism, political unrest or war, so in blue here you have: Libya, Oman, Ivory Coast, Syria that only leaves, Kazakhstan, Iran, Saudi ArabiaEver tried getting into Saudi Arabia?So apart from Western Sahara and Greenland (shouldn’t need much explanation why you’re not setting up business there), that leaves only Northern Europe – but that’s a private party and we’re not invited!!2 min
  7. We can’t talk about BDR without covering the topic of Business ContinuityIn short, Business Continuity is everything to do to –avoid- the business stopping, Disaster Recovery is what you do when it does.Most of the time the terminology Business Continuity is reserved for the larger scale practice of understanding everything that makes a business tick, what would you do if a key member of your IT team was hit by a bus? Does everyone else know that the person does? The process they have learned, built and fallen into over the months/years they have worked for the business. First and foremost businesses are made of people but after that most businesses today are made up of technology, so lets focus on the bit that we can assist with.
  8. I think the reason many of us avoid really drilling into the nitty gritty of Disaster planning is we don’t want to have to think about all the gory details. But in the face of a disaster, you’ll be glad you did, and you owe it to everyone to ensure you are ready.1min
  9. In short, Business Continuity is everything to do to –avoid- the business stopping, Disaster Recovery is what you do when it does.For the most part Disaster Recovery has become synonymous with IT. It has become the terminology for everything we do to prepare for when things gone wrong, and how we plan to first of all a) survive and then b) put things rightAnd when you think about the circumstances when these kinds of plans are put into action, it’s not going to be planned, this is something that is going to happen in real time – unless of course you are doing you’re all important testing – which is something you all do regularly right?2min
  10. Of course as much as we need to plan for the ‘big one’ often the actual disasters that regular impact a business are much more mundane, and much more common, so the chances of one of these effecting you is actually high.1 min
  11. All good BDR solutions start with a good plan. Before you choose/install software and hardware be clear about what your recovery objectives are, no software can save you if you don’t have a good plan.1 min
  12. I’m here to tell you that there is no need to backup, that’s right, you heard it here. Don’t back up.Backup is pointless. Think about these situations…Roger Harry – Circle ITDan Gross - ServiCorps
  13. What you need to do be able to do is recoverYou need to know what Recovery is going to look like, what its going to take and exactly how its going to happen in the case of any of these kinds of disasters
  14. 3minWe can’t cover every single part of a plan here, this isn’t meant to be an exhaustive list, just want to pick up on some of the key core components that can have the biggest impact on a plan.Cost of down time - A plan has no real meaning if we can’t equate an actual value to it, it’s partially and art, partially science, but 100% necessaryTiers of Data – In the end it’s the Data that has the value, but what value?Level of Resilience - Understand the parts of the business:work it out by vertical then across various potentially affected areas site, DC, System even a fileBuild a plan - Understand the Recovery Strategies that match those business needsMatch to a solution- Select the right approach to meet each specific need
  15. http://emersonnetworkpower.com/en-US/Brands/Liebert/Documents/White%20Papers/data-center-costs_24659-R02-11.pdfWithin every given business there are various elements that dictate your sensitive to outage.Hospitality has less sensitivity, at the higher is IT centric businesses such a communications1 min
  16. 
There’s the more obvious costs which include the items that are easier to calculate like the actual people time involved.1 min
  17. 
But it’s the other impacts to this business which are often larger, and can be more difficult to calculate.This category covers some of the more intangible costs. Did you incur late delivery surcharges? Did you pay overtime to staff to make up for lost productivity? Did missing a critical filing deadline result in penalties? Did a loss of customer goodwill erode your ongoing revenue stream? Did you need to plan and execute campaigns to explain and apologize for the outage?Downtime usually leads to a cascade of related costs. Work with your financial team to identify all such service costs incurred during or after a previous outage. Then, divide the total of these costs by the total number of hours the systems were down to determine the cost per hour.Totaling all of the above costs gives a reasonable forecast of the loss you can expect to incur from an hour of outage for a particular system. (Costs will vary depending on the nature of the application, so you must perform this calculation for each system.)To calculate the expected annual cost, multiply this number by the number of expected annual hours of outage.When considering all factors, the potential loss from critical system failure may be a shock the first time you calculate it.3 min
  18. Once you start to drill down into what is the major component of the cost of an outageThis chart reveals significant variation across nine cost categories. The cost associated with business disruption, which includes reputation damages and customer churn, represents the most expensive cost category. Least expensive involves the engagement of third parties such as consultants to aid in the resolution of the incident.2 min
  19. RTO and RPO(Online, Near-line, Offline)Customer facing – OnlineBusiness Transactions - MinutesOperational Data – Same DayPersonnel and Pay roll - WeekContracts and Records – Hardly everIN ever business there are things that you can’t live without what are they?But don’t forget other things, given enough time near-line and even offline data loss can have a big impact to business3 min
  20. 1 min
  21. Of course no discussion around recovery planning would be complete without RTO and RPO, but the point is that by contemplating all the previous, these should now be obvious, that all the other elements lead to a complete picture of your ‘Spectrum of Recovery’ across all the parts of your business.2 min
  22. And once you start to consider these elements together to really can build up a complete picture of Makes it easier to challenge your vendorsClarifies the decision making process3 min
  23. Of course key to ensuring the reliability and scalability of whatever approach you need to use, will be Automation of that process. Just want to point out that it needs to be plugged into Kaseya!1 min
  24. Animation: There’s no time like the present to review and refresh your plan, or if you don’t have one, create one.2 min
  25. 30 sec