SlideShare a Scribd company logo
1 of 22
Are Your PCs and Laptops Recovery and Discovery Ready? September  16, 2010 NFORMATION MANAGEMENT INFORMATION MANAGEMENT
Featured Speakers Laura DuBois Vice President Program  Development IDC Jackie Su, Senior Product Marketing Manager Allison Singh IT Strategist Special Guest IDC
The Goal of This Webcast is to: Learn successful methods employed by companies to achieve visibility, accessibility, and control over enterprise PCs before data loss happens and why a proactive strategy for recovery and discovery  is critical to your success.
Agenda Effective Backup/Discovery Strategies for Consideration Recovery/Discovery Case Study:  the Aveng Group Trends in Protection of Laptop and Desktop Data Questions and Answers Post Webcast: Chat with experts in the Solution Center
Key Challenges to Protecting PC Data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Technical Hurdles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data on Laptops and Desktops  as a Discovery Target ,[object Object],[object Object],[object Object],[object Object],Top 5 Content Stores Targeted for Preservation and Collection in Litigation Event ,[object Object],Source: Active Archiving Survey, IDC, March, 2010, n=508
Reasons for Deploying PC Backup 24% Past Event 53% Concerns about Potential Event 18% Legal or Regulatory Mandate N=135, IDC PC Backup Survey October 2009 Reasons for PC Backup
Importance of PC Backup Impact of Loss of data on PCs to a Firm, 46% indicated a loss of data on PCs, laptops or workstations is SERIOUS to EXTREMELY SERIOUS to their firm N=252, IDC PC Backup Survey October 2009 Seriousness of Data Loss on PCs for a Firm
Trends in Protection of Laptop and Desktop Data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PC Data Loss Statistics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],N=252, IDC PC Backup Survey October 2009
Past and Newer Approaches ,[object Object],[object Object],Central Backup Do It Yourself Use Network Shares Email to Home PC Online Backup
Implementing the Right Approach Some Considerations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Benefits to Adoption Mitigate risk with lost, stolen, misplaced laptops  Identify information exposures and better inform stakeholders Increase knowledge worker productivity in the event of a failure or problem  Aid in eDiscovery workflow and data processing, reduce costs  Aid IT for mobile workers, streamlined approach to get remote asset up and running again Gain centralized management, reduce help desk calls or close them more quickly
In Context of the Larger Data Protection Market ,[object Object],[object Object],[object Object],[object Object],[object Object]
Essential Guidance ,[object Object],[object Object],[object Object],[object Object],[object Object]
Customer Q & A ,[object Object]
Company Overview ,[object Object],[object Object],[object Object],[object Object],[object Object]
Recovery and Discovery for PCs and Laptops ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Connected® Discovery Edition Industry’s first eDiscovery-ready laptop data protection solution   for Backup and Recovery, Discovery, and Compliance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Iron Mountain The Information Management Company ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank you!

More Related Content

What's hot

Going Green Whitepaper
Going Green WhitepaperGoing Green Whitepaper
Going Green Whitepaper
UdayRavi
 
3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin
Clear Technologies
 
Skip the Disk, Move to the Cloud
Skip the Disk, Move to the CloudSkip the Disk, Move to the Cloud
Skip the Disk, Move to the Cloud
Iron Mountain
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
Yun Lu
 
Data_Protection_WP - Jon Toigo
Data_Protection_WP - Jon ToigoData_Protection_WP - Jon Toigo
Data_Protection_WP - Jon Toigo
Ed Ahl
 
Mtw03008 usen
Mtw03008 usenMtw03008 usen
Mtw03008 usen
rjstevens
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
Arrow ECS UK
 

What's hot (20)

Going Green Whitepaper
Going Green WhitepaperGoing Green Whitepaper
Going Green Whitepaper
 
3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin
 
Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3
 
Skip the Disk, Move to the Cloud
Skip the Disk, Move to the CloudSkip the Disk, Move to the Cloud
Skip the Disk, Move to the Cloud
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 
Dlp notes
Dlp notesDlp notes
Dlp notes
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
 
Stop flirting with disaster! Prepare your business for unforeseen disasters.
Stop flirting with disaster! Prepare your business for unforeseen disasters.Stop flirting with disaster! Prepare your business for unforeseen disasters.
Stop flirting with disaster! Prepare your business for unforeseen disasters.
 
Reengineered virtual infrastructure for a leading private equity enterprise.
Reengineered virtual infrastructure for a leading private equity enterprise.Reengineered virtual infrastructure for a leading private equity enterprise.
Reengineered virtual infrastructure for a leading private equity enterprise.
 
Data_Protection_WP - Jon Toigo
Data_Protection_WP - Jon ToigoData_Protection_WP - Jon Toigo
Data_Protection_WP - Jon Toigo
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 
Bcs consumerisation
Bcs consumerisationBcs consumerisation
Bcs consumerisation
 
Understanding Data Backups
Understanding Data BackupsUnderstanding Data Backups
Understanding Data Backups
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
Laserfiche empowercon302 2016
Laserfiche empowercon302 2016Laserfiche empowercon302 2016
Laserfiche empowercon302 2016
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
The Five Myths of Cloud-Based Disaster Recovery
The Five Myths of Cloud-Based Disaster Recovery The Five Myths of Cloud-Based Disaster Recovery
The Five Myths of Cloud-Based Disaster Recovery
 
Mtw03008 usen
Mtw03008 usenMtw03008 usen
Mtw03008 usen
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 

Similar to Are Your PCs and Laptops Recovery and Discovery Ready?

It Capabilities.2009
It Capabilities.2009It Capabilities.2009
It Capabilities.2009
Diontealley
 
Innovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementInnovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. Statement
Diontealley
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
jpmccormack
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentation
Vincent Kwon
 
IO Journey All Up
IO Journey All UpIO Journey All Up
IO Journey All Up
baselsss
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5
damonhough
 
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docxNFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
curwenmichaela
 
Logicalis Backup as a Service: Re-defining Data Protection
Logicalis Backup as a Service: Re-defining Data ProtectionLogicalis Backup as a Service: Re-defining Data Protection
Logicalis Backup as a Service: Re-defining Data Protection
Logicalis Australia
 

Similar to Are Your PCs and Laptops Recovery and Discovery Ready? (20)

Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
 
Manufacturing Data Center Fast Facts: Big Data, Storage, Security & Recovery
Manufacturing Data Center Fast Facts: Big Data, Storage, Security & RecoveryManufacturing Data Center Fast Facts: Big Data, Storage, Security & Recovery
Manufacturing Data Center Fast Facts: Big Data, Storage, Security & Recovery
 
It Capabilities.2009
It Capabilities.2009It Capabilities.2009
It Capabilities.2009
 
Innovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementInnovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. Statement
 
Microsoft Core Infrastructure Overview
Microsoft Core Infrastructure OverviewMicrosoft Core Infrastructure Overview
Microsoft Core Infrastructure Overview
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentation
 
IO Journey All Up
IO Journey All UpIO Journey All Up
IO Journey All Up
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5
 
Decide what's next discussion guide
Decide what's next discussion guideDecide what's next discussion guide
Decide what's next discussion guide
 
Decide what s_next_discussion_guide
Decide what s_next_discussion_guideDecide what s_next_discussion_guide
Decide what s_next_discussion_guide
 
Dstca
DstcaDstca
Dstca
 
Choosing A Secondary Storage
Choosing A Secondary StorageChoosing A Secondary Storage
Choosing A Secondary Storage
 
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docxNFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
 
TierPoint_ColocationWhitepaper-Six_Reasons
TierPoint_ColocationWhitepaper-Six_ReasonsTierPoint_ColocationWhitepaper-Six_Reasons
TierPoint_ColocationWhitepaper-Six_Reasons
 
Logicalis Backup as a Service: Re-defining Data Protection
Logicalis Backup as a Service: Re-defining Data ProtectionLogicalis Backup as a Service: Re-defining Data Protection
Logicalis Backup as a Service: Re-defining Data Protection
 

More from Iron Mountain

Why Should You Care About Information Management?
Why Should You Care About Information Management?Why Should You Care About Information Management?
Why Should You Care About Information Management?
Iron Mountain
 
Better Information Management for Improved Productivity
Better Information Management for Improved ProductivityBetter Information Management for Improved Productivity
Better Information Management for Improved Productivity
Iron Mountain
 
Getting Your House in Order: Cost-effective Litigation Readiness
Getting Your House in Order: Cost-effective Litigation ReadinessGetting Your House in Order: Cost-effective Litigation Readiness
Getting Your House in Order: Cost-effective Litigation Readiness
Iron Mountain
 
Email Archiving ROI. Two Simple Reasons to Archive Your Email Data Now.
Email Archiving ROI. Two Simple Reasons to Archive Your Email Data Now.Email Archiving ROI. Two Simple Reasons to Archive Your Email Data Now.
Email Archiving ROI. Two Simple Reasons to Archive Your Email Data Now.
Iron Mountain
 
Enterprise Discovery: Taking Control, Driving Change
Enterprise Discovery: Taking Control, Driving ChangeEnterprise Discovery: Taking Control, Driving Change
Enterprise Discovery: Taking Control, Driving Change
Iron Mountain
 
Six Steps to Information Management Compliance
Six Steps to Information Management ComplianceSix Steps to Information Management Compliance
Six Steps to Information Management Compliance
Iron Mountain
 

More from Iron Mountain (12)

Safeguarding Your Brand With Secure IT Asset Disposition
Safeguarding Your Brand With Secure IT Asset DispositionSafeguarding Your Brand With Secure IT Asset Disposition
Safeguarding Your Brand With Secure IT Asset Disposition
 
Build Your Foundation: Strategies and Tools for Managing Retention and Person...
Build Your Foundation: Strategies and Tools for Managing Retention and Person...Build Your Foundation: Strategies and Tools for Managing Retention and Person...
Build Your Foundation: Strategies and Tools for Managing Retention and Person...
 
Driving Digital Transformation
Driving Digital TransformationDriving Digital Transformation
Driving Digital Transformation
 
Privacy Advisory Service
Privacy Advisory ServicePrivacy Advisory Service
Privacy Advisory Service
 
Why Should You Care About Information Management?
Why Should You Care About Information Management?Why Should You Care About Information Management?
Why Should You Care About Information Management?
 
Better Information Management for Improved Productivity
Better Information Management for Improved ProductivityBetter Information Management for Improved Productivity
Better Information Management for Improved Productivity
 
Maximize the Business Value of Your Information
Maximize the Business Value of Your Information Maximize the Business Value of Your Information
Maximize the Business Value of Your Information
 
Getting Your House in Order: Cost-effective Litigation Readiness
Getting Your House in Order: Cost-effective Litigation ReadinessGetting Your House in Order: Cost-effective Litigation Readiness
Getting Your House in Order: Cost-effective Litigation Readiness
 
Email Archiving ROI. Two Simple Reasons to Archive Your Email Data Now.
Email Archiving ROI. Two Simple Reasons to Archive Your Email Data Now.Email Archiving ROI. Two Simple Reasons to Archive Your Email Data Now.
Email Archiving ROI. Two Simple Reasons to Archive Your Email Data Now.
 
Enterprise Discovery: Taking Control, Driving Change
Enterprise Discovery: Taking Control, Driving ChangeEnterprise Discovery: Taking Control, Driving Change
Enterprise Discovery: Taking Control, Driving Change
 
Six Steps to Information Management Compliance
Six Steps to Information Management ComplianceSix Steps to Information Management Compliance
Six Steps to Information Management Compliance
 
Top 5 Efficiency Tips
Top 5 Efficiency TipsTop 5 Efficiency Tips
Top 5 Efficiency Tips
 

Recently uploaded

Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
allensay1
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
laloo_007
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 

Recently uploaded (20)

Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From Seosmmearth
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' Slideshare
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna Exports
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
 
BeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdfBeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdf
 

Are Your PCs and Laptops Recovery and Discovery Ready?

  • 1. Are Your PCs and Laptops Recovery and Discovery Ready? September 16, 2010 NFORMATION MANAGEMENT INFORMATION MANAGEMENT
  • 2. Featured Speakers Laura DuBois Vice President Program Development IDC Jackie Su, Senior Product Marketing Manager Allison Singh IT Strategist Special Guest IDC
  • 3. The Goal of This Webcast is to: Learn successful methods employed by companies to achieve visibility, accessibility, and control over enterprise PCs before data loss happens and why a proactive strategy for recovery and discovery is critical to your success.
  • 4. Agenda Effective Backup/Discovery Strategies for Consideration Recovery/Discovery Case Study: the Aveng Group Trends in Protection of Laptop and Desktop Data Questions and Answers Post Webcast: Chat with experts in the Solution Center
  • 5.
  • 6.
  • 7.
  • 8. Reasons for Deploying PC Backup 24% Past Event 53% Concerns about Potential Event 18% Legal or Regulatory Mandate N=135, IDC PC Backup Survey October 2009 Reasons for PC Backup
  • 9. Importance of PC Backup Impact of Loss of data on PCs to a Firm, 46% indicated a loss of data on PCs, laptops or workstations is SERIOUS to EXTREMELY SERIOUS to their firm N=252, IDC PC Backup Survey October 2009 Seriousness of Data Loss on PCs for a Firm
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. Benefits to Adoption Mitigate risk with lost, stolen, misplaced laptops Identify information exposures and better inform stakeholders Increase knowledge worker productivity in the event of a failure or problem Aid in eDiscovery workflow and data processing, reduce costs Aid IT for mobile workers, streamlined approach to get remote asset up and running again Gain centralized management, reduce help desk calls or close them more quickly
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.

Editor's Notes

  1. Data Protection in the U.S. SMB Market, 2008 IDC’s Special Report Copyright 2008 IDC. Reproduction is forbidden unless authorized. All rights reserved.