Your SlideShare is downloading. ×

Disaster Recovery

1,846

Published on

This presentation talks through Disaster Recovery for small businesses, including, planning and backup.

This presentation talks through Disaster Recovery for small businesses, including, planning and backup.

Published in: Technology, Business
1 Comment
1 Like
Statistics
Notes
No Downloads
Views
Total Views
1,846
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
162
Comments
1
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Welcome to the Mission Critical Systems Disaster Recovery Webinar. Thank you for coming. Presenters.
  • Slider Bar to hide the control panel::: Audio::: Questions::: If all else fails, or you’re pulled away, email for copy:::
  • IT Management::: SharePoint Development::: Training Calendar:::
  • Disaster Recovery from a more formal perspective, and hosted backup solutions.
  • DR part of business continuity planning. SEAN
  • Types of disastersMost people think of fire, but hardware failure and malicious behavior are more common. SEAN
  • Each business’s threat matrix looks different.Hardware failure is very common SEAN STEVEN - Malicious behavior does happen to small businesses. “40% of small to medium businesses that manage their nown network annd use the Internet for more than e-mail will have their network accessed by a hacker, and more that 50% won’t even know they were attacked” Gartner Group.Client with foreign language videos on her server.Lose a Laptop at Starbucks
  • First step is to create a formal Disaster Recovery Plan.
  • Why are IT disasters so catastrophic?Knowledge / Information companyEven simple networks take time to set up. ******Hit Animation******Disaster Recovery is about minimizing this time.
  • SEAN
  • 1) Recovery Point::: 2) Time to Recovery::: 3) Budget:::
  • SEAN
  • STEVEN
  • If a server won’t be available for 4 days, what can be done in the mean time?What functions of the business need to be working first? What can wait until later?Make the most of your employees.Conversation between Sean and Steven
  • BudgetSTEVEN
  • STEVEN – Define ProductSEAN – Pros and Cons
  • STEVEN – Define ProductSEAN – Pros and Cons
  • STEVEN – Define ProductSEAN – Pros and Cons
  • Transcript

    • 1. Welcome to the Disaster Recovery Webinar Presenters: Steven Nichols, Director Business Development 303-383-1627 x 1104 Sean McDonald, Director IT Services 303-383-1627 x 1011 Aaron Johnson, Senior Account Manager 801-758-1045
    • 2. How to use the webinar interface DR@mcstech.net
    • 3. www.MCStech.net
    • 4. What we will cover What is Disaster Recovery Nature of Disasters Disaster Recovery planning Why Develop a plan What goes into a plan Backup solutions How to respond to a disaster 45 minutes presentation Q&A
    • 5. Disaster Recovery/ Hosted Backup Luncheon When: Wednesday, April 28th 12:00 – 1:00 Where: Denver Chop House 1735 19th Street What: Hosted backup and formal disaster recovery planning luncheon for more technical users To register, call, email 303-383-1627 x 1104 dr@mcstech.net
    • 6. Business Continuity Planning Disaster Recovery How to respond to the unthinkable
    • 7. Types of IT disasters • Disk corruption, power surges, accidental damageHardware failure • Stolen laptops, USB drives, servers, workstationsTheft of hardware • Disgruntled employees, viruses, hackers Malicious destruction • Smoke damage, fire sprinklers, total lossFire • Floods, earthquakes, violence, volcanoes Things that make the news
    • 8. 37% 26% 14% 13% 10% Frequency of Disasters Hardware failure Viruses and hackers Natural Disasters, Fire, Floods Malicious Employee behavior Man made disasters
    • 9. Disaster Recovery planning Why disaster recovery planning is important Writing a formal document Choosing the right pieces Backup solutions
    • 10. Businesses with disaster recovery plans are more likely to survive disasters Compliance with HIPAA, SOX Good Business Governance Small investment for huge return 6 % of companies suffering from a catastrophic data loss will survive. 43 % never reopen 51 % close within two years. -University of Texas
    • 11. Why is it so hard to survive a loss? Complexity of networkData is the company Time is Money Order servers 0-6 days Build network 2-3 days Reload Data 1-3 days
    • 12. Disaster Recovery planning Why disaster recovery planning is important Writing a formal document Choosing the right pieces Backup solutions
    • 13. Right!Wrong! Where should you keep your plan? Electronically? Printed out?
    • 14. What goes in the plan Contact information Employees Vendors (especially backup vendors) Key customers Definition of responsibilities Who declares a disaster Who orders the new hardware Who initiates the phone tree Budget & roadmap for rebuilding network Hardware quotes or estimates Plan for restoring software Directions and schedule for rebuilding Full documentation of existing system Hardware specifications and layout Software layout and serial numbers Network design
    • 15. Disaster Recovery planning Why disaster recovery planning is important Writing a formal document Choosing the right pieces Backup solutions
    • 16. Budget Time to Recovery Recovery Point
    • 17. Recovery Point How should IT look after recovery? Is Identical necessary or desirable? Is there a rally point between entirely down and ideal? Recovery of data vs. simple ability to move forward Can any data be lost? Compliance considerations
    • 18. Time to recovery System 8 hours 24 hours 48 hours 96 hours 1 week Internet Access Partial Functionality Fully Functional Phones Partial Functionality Fully Functional Workstations Down Partial Functionality Fully Functional Network Down Partial Functionality Fully Functional File Share Server Down Partial Functionality Fully Functional Email Server Down Fully Functional Applications Server Down Partial Functionality Fully Functional
    • 19. Synchronize your needs and abilities Business needs Equipment availability Human availability
    • 20. Budget Pre-disaster expenses On-going cost (mostly backup) Initial cost in hours and hardware Post-disaster expenses Hardware Software Expense of being down, lost revenue
    • 21. Disaster Recovery planning Why disaster recovery planning is important Writing a formal document Choosing the right pieces Backup solutions
    • 22. Backup solutions USB Backup Tape Backup Hosted Disk / Disk Backup
    • 23. USB Backup Pros Cons
    • 24. Tape Back-up Pros Cons
    • 25. Hosted Disk / Disk Pros Cons
    • 26. Storage in the Cloud: The Future is Now?
    • 27. i365, A Seagate Company Subsidiary of Seagate Technology, a $13B Company 22,000 Satisfied Small, Mid- Size and Large Enterprise Customers Over 500 employees Operating in US, Canada, and Europe Member Microsoft Global ISV program • All data replicated to multiple geographies • Comprehensive DR plans for every data center • Redundant Internet connectivity 10 high availability Type IV certified data centers • SAS-70 Type II Audited • ISO 9001 Certified Data Restoration/Migration Labs • ISO 27001 security management program • Data encrypted at all times (at rest and in motion) Best in class secure and scalable
    • 28. Internal Challenges Technology Dependence Explosive Data Growth Application growth Data retention Customer correspondence Limited Resources Managing more devices, projects, people Supporting distributed environments Supporting mobile workforce Telecommuting, locations Employee Expectations Longer production days On-demand culture Protect investments Business Plans Mergers, Acquisitions, Expansion Integrating environments Standardizing key policies
    • 29. External Challenges Customers - Litigation Culture • Customer expectations • Sensitive personal information • Protect your company brand • Identity theft Government - Regulatory Compliance • Confidentiality • Security requirements • Accessibility • Retention policies Preparing for the unexpected • High cost of downtime • Assessing risks • Solidify disaster recovery plans
    • 30. Traditional Backup Process Tape Vaulting Service (e.g. Iron Mountain, Recall, etc.) Backup Software (Symantec, CA, IBM, etc.) Potential for Operating Inefficiencies
    • 31. Traditional Recovery Process Tapes are sent from vaulting warehouse Tapes are delivered back to the company requesting them. Cannot keep up with business pressures
    • 32. 32 or
    • 33. EVault Software
    • 34. Security Measures Controlled Environment:  Administrative rights, centralization, automated, eliminate unreliable third party transport services Software Security:  Data is encrypted end to end. Customer chooses between 56-bit Blowfish, 56-bit DES, 112-bit Triple-DES, 128-bit Blowfish, 256 and 128-bit AES encryption levels  Customer is the sole owner of the encryption key – even EVault cannot access the data  EVault DeltaPro™, is a self-encrypting process, adding an additional level of security  SAS 70 Type II certified Hardware Security:  Best of breed hardware (EMC, Dell, HP, Nexsan)  Preemptive predictable monitoring  RAID 5+ redundancy built in
    • 35. Facility Security Measures SunGard, Seagate Security key card access only 24 x 7 security guard Facility video surveillance Private, locked, caged vault space Redundant power supply Redundant Internet connectivity Advanced fire detection and fire suppression systems Humidity and water detection systems Climate controlled
    • 36. EVault Recovery Process Recovery Scenarios Recovery Options • Online point-and-click for full recovery of files and folders via IPLost files and folders • Rebuild servers directly off mass storage device, ship to off-site location, if necessaryBare-metal restores, server rebuilds, OS upgrades • Data resides in hot site facility • EVault Protect QuickShipSM mobile vault for high-level restores • On-site professional services available to assist in recovery process Full environment recovery, System State, Data files
    • 37. Enterprise Customers
    • 38. Recovering from a Disaster Recognize a disaster exists Martial your forces Follow the plan
    • 39. • Evaluate current systems, backups, policies, documentation • Recommendations for improvement • Matching budget with expectations and risk Disaster Recovery Assessment • Gather the contact information • Decide on elements to include (backup) • Build directions and budget Develop a formal plan • Print out copies of the plan • Install systems • Test, and evaluate Execute the plan
    • 40. Disaster Recovery/ Hosted Backup Luncheon When: Wednesday, April 28th 12:00 – 1:00 Where: Denver Chop House 1735 19th Street What: Hosted backup and formal disaster recovery planning luncheon for more technical users To register, call 303-383-1627 x 1104
    • 41. Questions? Presenters: Steven Nichols, Director Business Development 303-383-1627 x 1104 Sean McDonald, Director IT Services 303-383-1627 x 1011 Aaron Johnson, Senior Account Manager 801-758-1045
    • 42. Steven Nichols 303-383-1627 xtn: 1104 dr@mcstech.net Disaster Recovery Assessments are ½ price until May 15th Disaster Recovery Assessment Evaluate current systems, backups, policies, documentation Recommendations for improvement Matching budget with expectations and risk

    ×