SlideShare a Scribd company logo
1 of 18
Business Continuity
      for the SMB Market,
      featuring MirrorCloud


Award Winning for Technology Innovation
Zenith Infotech Technology Awards
         Infotech Spotlight:
         2011 10 Tech Companies to Watch

         Xchange Americas:
         2010 Breakthrough Technology Vendor
         2010 Xcellence in Service
         2010 Best Overall Show
         2009 Best Revenue Generator

         IT Channel Vision:
         2008 Best Solution Provider Channel Strategy
         2007 Nominee for Best xSP Channel Strategy
         2007 Nominee for Best xSP Solution: Software

                    2
About Zenith Infotech Ltd.



 Established in 2001
 Developing Award Winning Technology Innovations- first to release BDR with
  over 37,000 currently deployed
 Spent Millions of dollars to bring MirrorCloud to market
 Currently over 3,000 Channel Partners reselling BDR, MirrorCloud and
  SmartStyle Office
 Mumbai-based Operations Support with team strength at 427 of which 45 of
  those in Product Development and an additional development team in Belgium
 64 Business Development Reps, Product Specialist and Marketing support
  personnel in our US Headquarters based in Pittsburgh, PA
By the Numbers

• 93% of companies that lost their data for 10 days or more filed for
  bankruptcy within one year of the disaster, and 50% filed for bankruptcy
  immediately. (Source: National Archives & Records Administration in
  Washington.)


• 20% of small to medium businesses will suffer a major disaster causing
  loss of critical data every 5 years. (Source: Richmond House Group)


• This year, 40% of small to medium businesses that manage their own
  network and use the Internet for more than e-mail will have their
  network accessed by a hacker, and more than 50% won’t even know
  they were attacked. (Source: Gartner Group)

                                   4
By the Numbers

• About 70% of business people have experienced (or will experience)
  data loss due to accidental deletion, disk or system failure, viruses,
  fire or some other disaster (Source: Carbonite, an online backup
  service)


• The first reaction of employees who lose their data is to try to recover
  the lost data themselves by using recovery software or either
  restarting or unplugging their computer — steps that can make later
  data recovery impossible. (Source: 2005 global survey by
  Minneapolis-based Ontrack Data Recovery)




                                   5
Why DR?

                                       Man made
  Natural disasters
  Fire, flood, lightning,              Terrorism, arson,
  severe weather                       sabotage, theft,
                                       disgruntled ex-employees
   Data
Protection                           Technical failure
                                     Hardware, software applications




                                   Building
       Staff                       Explosion, security failure, utility
       Pandemic flu, ...           failure e.g. loss of power



                            6
Business Continuity Planning
Customer Evaluation questions….
1.   What are you doing to ensure Business Continuity and Disaster Recovery when
     it comes to IT?
2.  How do you back up your data currently? Tape, Hard drive, cloud?
3.  Have you ever restored from your back up? How long did it take? Did it work?
4.  Are you backing up offsite? How often? How do you know the image is valid?
5.  What is an acceptable down-time for your company or how quickly do they want
    to recover from a disaster?
6. What impact would it have if you lost all of your data?
7. How do you protect your data?
8. What is your budget?
9. Do you want to implement offsite Disaster Recovery?
10. What are your data storage requirements (archive, current image)?
11. Do you have any compliance regulations? HIPAA, SOX, PCI
Factors to consider when
                      selecting a DR solution

•   The solution should provide protection for all data, whether
    that data resides on a servers, laptops or desktop computers.

•   Off-site and on-site backups should occur at regular intervals
    to meet individual clients’ needs.

•   Backups should occur rapidly and seamlessly to avoid
    interfering with server performance while the backup process
    is being executed.



                                8
Factors to consider when
                          selecting a solution
•   For best results, off-site backup should be provided at a
    hardened, secure data center, and that has a high level of
    physical security in place along with internet and power
    redundancy. Data should be secure on-site as well as off-site
    by using a high level of encryption. The encryption key should
    be kept in a secure location either by the end-client
    themselves, or their respective solution provider.

•   The Backup and Disaster Recovery solution should restore
    server images to dissimilar hardware. This is essential, as it
    prevents customers from being limited by the type of new
    server that will be installed.

                                 9
A Comprehensive Solution Must


Protect
  Valuable Data &

Minimize
      Downtime!


            10
Introducing MirrorCloud

   • MirrorCloud is business continuity software that…
       –Mirrors data to the SmartStyle private cloud (onsite)
       –Mirrors data to the Zenith public cloud (offsite)


                                         Remote Mirroring
                                         • Once a day
         Server
                                         • Base + incremental   Zenith
Local Mirroring                                                 Public
                                         • Compressed
• Block-level copy                                              Cloud
                                         • Encrypted
• Uncompressed
• Unencrypted             SmartStyle
                         Private Cloud
                                    11
Introducing “MirrorCloud “ Video
    Click Box below to start




          12
MirrorCloud
Animation slides




      13
MirrorCloud Features




     14
MirrorCloud Features

• Protect Windows Desktops and Servers
• Continuous Block-Level Mirroring
• Quick File and Folder Level Recovery
• Granular Exchange Recovery with Ontrack Power Controls
• Virtualize Failed Desktops or Servers
• Live Bare Metal Recovery



            Server                   SmartStyle
                                    Private Cloud
                          15
MirrorCloud
              (The next generation in Business Continuity)

1. Pre-engineered, Linux-based Cloud Servers with solid state
   drives for faster virtualization when needed
2. Hypervisor loaded- Virtual Box
3. Block level backup and storage
4. Continuous Mirroring in real-time
5. Onsite, standby server
6. Stackable, scalable node-based architecture in 2TB increments
7. No obsolescence
8. Windows Servers and Desktops can be backed up
9. RAIN vs. Raid= more fault tolerance
10.Bitspread Technology=more security and fault tolerance
11.Run primary workloads-not just back up, stepping stone to
   virtualizing the entire environment
12. Optional Offsite storage available
                                   16
MirrorCloud Offsite Features

• Snapshots are 256-bit encrypted
• Transferred over an encrypted tunnel
• Schedule offsite replication
• State of the Art Data Center in Lenoir, NC
• Request offsite images at any time




           Server                    Zenith Public
                                        Cloud
                           17
Ask your Account Executive
      about Pricing and Sizing your
      environment with
      MirrorCloud


Award Winning for Technology Innovation

More Related Content

What's hot

Business Intelligence In Cloud Computing A Tokenization Approach Final
Business Intelligence In Cloud Computing  A Tokenization Approach FinalBusiness Intelligence In Cloud Computing  A Tokenization Approach Final
Business Intelligence In Cloud Computing A Tokenization Approach FinalHossam Hassanien
 
USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines ComplianceUSB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines ComplianceNetwrix Corporation
 
MT23 Benefits of Modular Computing from Data Center to Branch Office
MT23 Benefits of Modular Computing from Data Center to Branch OfficeMT23 Benefits of Modular Computing from Data Center to Branch Office
MT23 Benefits of Modular Computing from Data Center to Branch OfficeDell EMC World
 
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...CaseCentral
 
David Goulden keynote at Dell EMC World
David Goulden keynote at Dell EMC WorldDavid Goulden keynote at Dell EMC World
David Goulden keynote at Dell EMC WorldDell EMC World
 
Data Protection Fde Solution Presentation
Data Protection Fde Solution PresentationData Protection Fde Solution Presentation
Data Protection Fde Solution Presentationjuniortstanley
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused EnterpriseNovell
 
What we do at Abacus
What we do at AbacusWhat we do at Abacus
What we do at AbacusNovember014
 
MT41 Dell EMC VMAX: Ask the Experts
MT41 Dell EMC VMAX: Ask the Experts MT41 Dell EMC VMAX: Ask the Experts
MT41 Dell EMC VMAX: Ask the Experts Dell EMC World
 
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...
UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...Livingstone Advisory
 
Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary Intel IT Center
 
Egress Switch Datasheet
Egress Switch Datasheet Egress Switch Datasheet
Egress Switch Datasheet yonifine
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachNovell
 
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...Skoda Minotti
 
VMworld 2013: Low-Cost, High-Performance Storage for VMware Horizon Desktops
VMworld 2013: Low-Cost, High-Performance Storage for VMware Horizon Desktops VMworld 2013: Low-Cost, High-Performance Storage for VMware Horizon Desktops
VMworld 2013: Low-Cost, High-Performance Storage for VMware Horizon Desktops VMworld
 
Top 10 Things Logs Can Do for You, Today
Top 10 Things Logs Can Do for You, TodayTop 10 Things Logs Can Do for You, Today
Top 10 Things Logs Can Do for You, TodaySolarWinds
 
Rothke - A Pragmatic Approach To Purchasing Information Security Products
Rothke - A Pragmatic Approach To Purchasing Information Security ProductsRothke - A Pragmatic Approach To Purchasing Information Security Products
Rothke - A Pragmatic Approach To Purchasing Information Security ProductsBen Rothke
 
Aureus disaster planning
Aureus   disaster planningAureus   disaster planning
Aureus disaster planningAureusIT
 
Best practices for Vblock Monitoring with FusionStorm and Nimsoft
Best practices for Vblock Monitoring with FusionStorm and NimsoftBest practices for Vblock Monitoring with FusionStorm and Nimsoft
Best practices for Vblock Monitoring with FusionStorm and NimsoftCA Nimsoft
 

What's hot (20)

Business Intelligence In Cloud Computing A Tokenization Approach Final
Business Intelligence In Cloud Computing  A Tokenization Approach FinalBusiness Intelligence In Cloud Computing  A Tokenization Approach Final
Business Intelligence In Cloud Computing A Tokenization Approach Final
 
USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines ComplianceUSB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
 
MT23 Benefits of Modular Computing from Data Center to Branch Office
MT23 Benefits of Modular Computing from Data Center to Branch OfficeMT23 Benefits of Modular Computing from Data Center to Branch Office
MT23 Benefits of Modular Computing from Data Center to Branch Office
 
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
 
David Goulden keynote at Dell EMC World
David Goulden keynote at Dell EMC WorldDavid Goulden keynote at Dell EMC World
David Goulden keynote at Dell EMC World
 
Data Protection Fde Solution Presentation
Data Protection Fde Solution PresentationData Protection Fde Solution Presentation
Data Protection Fde Solution Presentation
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused Enterprise
 
What we do at Abacus
What we do at AbacusWhat we do at Abacus
What we do at Abacus
 
MT41 Dell EMC VMAX: Ask the Experts
MT41 Dell EMC VMAX: Ask the Experts MT41 Dell EMC VMAX: Ask the Experts
MT41 Dell EMC VMAX: Ask the Experts
 
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...
UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...
 
Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary
 
Egress Switch Datasheet
Egress Switch Datasheet Egress Switch Datasheet
Egress Switch Datasheet
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated Approach
 
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
 
VMworld 2013: Low-Cost, High-Performance Storage for VMware Horizon Desktops
VMworld 2013: Low-Cost, High-Performance Storage for VMware Horizon Desktops VMworld 2013: Low-Cost, High-Performance Storage for VMware Horizon Desktops
VMworld 2013: Low-Cost, High-Performance Storage for VMware Horizon Desktops
 
Top 10 Things Logs Can Do for You, Today
Top 10 Things Logs Can Do for You, TodayTop 10 Things Logs Can Do for You, Today
Top 10 Things Logs Can Do for You, Today
 
Rothke - A Pragmatic Approach To Purchasing Information Security Products
Rothke - A Pragmatic Approach To Purchasing Information Security ProductsRothke - A Pragmatic Approach To Purchasing Information Security Products
Rothke - A Pragmatic Approach To Purchasing Information Security Products
 
Private Cloud for Dummies
Private Cloud for DummiesPrivate Cloud for Dummies
Private Cloud for Dummies
 
Aureus disaster planning
Aureus   disaster planningAureus   disaster planning
Aureus disaster planning
 
Best practices for Vblock Monitoring with FusionStorm and Nimsoft
Best practices for Vblock Monitoring with FusionStorm and NimsoftBest practices for Vblock Monitoring with FusionStorm and Nimsoft
Best practices for Vblock Monitoring with FusionStorm and Nimsoft
 

Viewers also liked

Dr gary wills on Development and Community Informatics
Dr gary wills on Development and Community InformaticsDr gary wills on Development and Community Informatics
Dr gary wills on Development and Community InformaticsEnvisage RTI
 
THE HUNGARIAN SECRET POLICE
THE HUNGARIAN SECRET POLICETHE HUNGARIAN SECRET POLICE
THE HUNGARIAN SECRET POLICEOWTF
 
LDAP Injections & Blind LDAP Injections Paper
LDAP Injections & Blind LDAP Injections PaperLDAP Injections & Blind LDAP Injections Paper
LDAP Injections & Blind LDAP Injections PaperE Hacking
 
20150705 주일예배, 막06장14 29절, 복음에 헌신하는 의인의 삶
20150705 주일예배, 막06장14 29절, 복음에 헌신하는 의인의 삶20150705 주일예배, 막06장14 29절, 복음에 헌신하는 의인의 삶
20150705 주일예배, 막06장14 29절, 복음에 헌신하는 의인의 삶Myeongnyun Mission Church
 
Tv promotion 2
Tv promotion 2Tv promotion 2
Tv promotion 2natasha138
 
why LG IPS technology?
why LG IPS technology?why LG IPS technology?
why LG IPS technology?moshimoshi
 
marketing of lG Scarlet
marketing of lG Scarletmarketing of lG Scarlet
marketing of lG Scarletgopesh maurya
 
Case study (TV) new and digital media
Case study (TV) new and digital mediaCase study (TV) new and digital media
Case study (TV) new and digital mediaCHSGmedia
 

Viewers also liked (9)

Dr gary wills on Development and Community Informatics
Dr gary wills on Development and Community InformaticsDr gary wills on Development and Community Informatics
Dr gary wills on Development and Community Informatics
 
THE HUNGARIAN SECRET POLICE
THE HUNGARIAN SECRET POLICETHE HUNGARIAN SECRET POLICE
THE HUNGARIAN SECRET POLICE
 
LDAP Injections & Blind LDAP Injections Paper
LDAP Injections & Blind LDAP Injections PaperLDAP Injections & Blind LDAP Injections Paper
LDAP Injections & Blind LDAP Injections Paper
 
Am4103223229
Am4103223229Am4103223229
Am4103223229
 
20150705 주일예배, 막06장14 29절, 복음에 헌신하는 의인의 삶
20150705 주일예배, 막06장14 29절, 복음에 헌신하는 의인의 삶20150705 주일예배, 막06장14 29절, 복음에 헌신하는 의인의 삶
20150705 주일예배, 막06장14 29절, 복음에 헌신하는 의인의 삶
 
Tv promotion 2
Tv promotion 2Tv promotion 2
Tv promotion 2
 
why LG IPS technology?
why LG IPS technology?why LG IPS technology?
why LG IPS technology?
 
marketing of lG Scarlet
marketing of lG Scarletmarketing of lG Scarlet
marketing of lG Scarlet
 
Case study (TV) new and digital media
Case study (TV) new and digital mediaCase study (TV) new and digital media
Case study (TV) new and digital media
 

Similar to Zenith Infotech Mirror Cloud Presentation. 112211

Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Skytap Cloud
 
Webinar: Making The Always-On Data Center A Reality
Webinar: Making The Always-On Data Center A RealityWebinar: Making The Always-On Data Center A Reality
Webinar: Making The Always-On Data Center A RealityStorage Switzerland
 
Disaster Recovery Solutions
Disaster Recovery SolutionsDisaster Recovery Solutions
Disaster Recovery SolutionsManuel Daza
 
Sphere 3D presentation for Credit Suisse technology conference 2014
Sphere 3D presentation for Credit Suisse technology conference 2014Sphere 3D presentation for Credit Suisse technology conference 2014
Sphere 3D presentation for Credit Suisse technology conference 2014Peter Bookman
 
Your path to the cloud local event presentation
Your path to the cloud   local event presentationYour path to the cloud   local event presentation
Your path to the cloud local event presentationawrightKMBS
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudErik Von Schlehenried
 
Financial and Operational Results by moving to the Cloud!
Financial and Operational Results by moving to the Cloud! Financial and Operational Results by moving to the Cloud!
Financial and Operational Results by moving to the Cloud! awrightKMBS
 
Four Reasons Why Your Backup & Recovery Hardware will Break by 2020
Four Reasons Why Your Backup & Recovery Hardware will Break by 2020Four Reasons Why Your Backup & Recovery Hardware will Break by 2020
Four Reasons Why Your Backup & Recovery Hardware will Break by 2020Storage Switzerland
 
S100293 hybrid-cloud-orlando-v1804a
S100293 hybrid-cloud-orlando-v1804aS100293 hybrid-cloud-orlando-v1804a
S100293 hybrid-cloud-orlando-v1804aTony Pearson
 
Eo navigating the cloud
Eo navigating the cloudEo navigating the cloud
Eo navigating the cloudeophiladelphia
 
Eo navigating the cloud v8
Eo navigating the cloud v8Eo navigating the cloud v8
Eo navigating the cloud v8Nerve2012
 
Cloudciti Disaster Recovery as a Service
Cloudciti Disaster Recovery as a Service   Cloudciti Disaster Recovery as a Service
Cloudciti Disaster Recovery as a Service PT Datacomm Diangraha
 
4.1 Introduction to cloud storage.pptx
4.1 Introduction to cloud storage.pptx4.1 Introduction to cloud storage.pptx
4.1 Introduction to cloud storage.pptxyasothamohankumar
 
26-170918023441.pptx
26-170918023441.pptx26-170918023441.pptx
26-170918023441.pptxaravind Guru
 
26-170918023441 (1).pptx
26-170918023441 (1).pptx26-170918023441 (1).pptx
26-170918023441 (1).pptxAnSHiKa187943
 
NetIDEAS Inc. - Enabling Global Design Teams with hosted Windchill
NetIDEAS Inc. - Enabling Global Design Teams with hosted WindchillNetIDEAS Inc. - Enabling Global Design Teams with hosted Windchill
NetIDEAS Inc. - Enabling Global Design Teams with hosted WindchillJeff Kiesel
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4Valencell, Inc.
 

Similar to Zenith Infotech Mirror Cloud Presentation. 112211 (20)

Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely
 
Webinar: Making The Always-On Data Center A Reality
Webinar: Making The Always-On Data Center A RealityWebinar: Making The Always-On Data Center A Reality
Webinar: Making The Always-On Data Center A Reality
 
The Sun Cloud
The Sun CloudThe Sun Cloud
The Sun Cloud
 
Disaster Recovery Solutions
Disaster Recovery SolutionsDisaster Recovery Solutions
Disaster Recovery Solutions
 
Sphere 3D presentation for Credit Suisse technology conference 2014
Sphere 3D presentation for Credit Suisse technology conference 2014Sphere 3D presentation for Credit Suisse technology conference 2014
Sphere 3D presentation for Credit Suisse technology conference 2014
 
Your path to the cloud local event presentation
Your path to the cloud   local event presentationYour path to the cloud   local event presentation
Your path to the cloud local event presentation
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloud
 
Financial and Operational Results by moving to the Cloud!
Financial and Operational Results by moving to the Cloud! Financial and Operational Results by moving to the Cloud!
Financial and Operational Results by moving to the Cloud!
 
somee.pptx
somee.pptxsomee.pptx
somee.pptx
 
Four Reasons Why Your Backup & Recovery Hardware will Break by 2020
Four Reasons Why Your Backup & Recovery Hardware will Break by 2020Four Reasons Why Your Backup & Recovery Hardware will Break by 2020
Four Reasons Why Your Backup & Recovery Hardware will Break by 2020
 
S100293 hybrid-cloud-orlando-v1804a
S100293 hybrid-cloud-orlando-v1804aS100293 hybrid-cloud-orlando-v1804a
S100293 hybrid-cloud-orlando-v1804a
 
Eo navigating the cloud
Eo navigating the cloudEo navigating the cloud
Eo navigating the cloud
 
Eo navigating the cloud v8
Eo navigating the cloud v8Eo navigating the cloud v8
Eo navigating the cloud v8
 
Cloudciti Disaster Recovery as a Service
Cloudciti Disaster Recovery as a Service   Cloudciti Disaster Recovery as a Service
Cloudciti Disaster Recovery as a Service
 
4.1 Introduction to cloud storage.pptx
4.1 Introduction to cloud storage.pptx4.1 Introduction to cloud storage.pptx
4.1 Introduction to cloud storage.pptx
 
ChodonKumar.pptx
ChodonKumar.pptxChodonKumar.pptx
ChodonKumar.pptx
 
26-170918023441.pptx
26-170918023441.pptx26-170918023441.pptx
26-170918023441.pptx
 
26-170918023441 (1).pptx
26-170918023441 (1).pptx26-170918023441 (1).pptx
26-170918023441 (1).pptx
 
NetIDEAS Inc. - Enabling Global Design Teams with hosted Windchill
NetIDEAS Inc. - Enabling Global Design Teams with hosted WindchillNetIDEAS Inc. - Enabling Global Design Teams with hosted Windchill
NetIDEAS Inc. - Enabling Global Design Teams with hosted Windchill
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 

Zenith Infotech Mirror Cloud Presentation. 112211

  • 1. Business Continuity for the SMB Market, featuring MirrorCloud Award Winning for Technology Innovation
  • 2. Zenith Infotech Technology Awards Infotech Spotlight: 2011 10 Tech Companies to Watch Xchange Americas: 2010 Breakthrough Technology Vendor 2010 Xcellence in Service 2010 Best Overall Show 2009 Best Revenue Generator IT Channel Vision: 2008 Best Solution Provider Channel Strategy 2007 Nominee for Best xSP Channel Strategy 2007 Nominee for Best xSP Solution: Software 2
  • 3. About Zenith Infotech Ltd.  Established in 2001  Developing Award Winning Technology Innovations- first to release BDR with over 37,000 currently deployed  Spent Millions of dollars to bring MirrorCloud to market  Currently over 3,000 Channel Partners reselling BDR, MirrorCloud and SmartStyle Office  Mumbai-based Operations Support with team strength at 427 of which 45 of those in Product Development and an additional development team in Belgium  64 Business Development Reps, Product Specialist and Marketing support personnel in our US Headquarters based in Pittsburgh, PA
  • 4. By the Numbers • 93% of companies that lost their data for 10 days or more filed for bankruptcy within one year of the disaster, and 50% filed for bankruptcy immediately. (Source: National Archives & Records Administration in Washington.) • 20% of small to medium businesses will suffer a major disaster causing loss of critical data every 5 years. (Source: Richmond House Group) • This year, 40% of small to medium businesses that manage their own network and use the Internet for more than e-mail will have their network accessed by a hacker, and more than 50% won’t even know they were attacked. (Source: Gartner Group) 4
  • 5. By the Numbers • About 70% of business people have experienced (or will experience) data loss due to accidental deletion, disk or system failure, viruses, fire or some other disaster (Source: Carbonite, an online backup service) • The first reaction of employees who lose their data is to try to recover the lost data themselves by using recovery software or either restarting or unplugging their computer — steps that can make later data recovery impossible. (Source: 2005 global survey by Minneapolis-based Ontrack Data Recovery) 5
  • 6. Why DR? Man made Natural disasters Fire, flood, lightning, Terrorism, arson, severe weather sabotage, theft, disgruntled ex-employees Data Protection Technical failure Hardware, software applications Building Staff Explosion, security failure, utility Pandemic flu, ... failure e.g. loss of power 6
  • 7. Business Continuity Planning Customer Evaluation questions…. 1. What are you doing to ensure Business Continuity and Disaster Recovery when it comes to IT? 2. How do you back up your data currently? Tape, Hard drive, cloud? 3. Have you ever restored from your back up? How long did it take? Did it work? 4. Are you backing up offsite? How often? How do you know the image is valid? 5. What is an acceptable down-time for your company or how quickly do they want to recover from a disaster? 6. What impact would it have if you lost all of your data? 7. How do you protect your data? 8. What is your budget? 9. Do you want to implement offsite Disaster Recovery? 10. What are your data storage requirements (archive, current image)? 11. Do you have any compliance regulations? HIPAA, SOX, PCI
  • 8. Factors to consider when selecting a DR solution • The solution should provide protection for all data, whether that data resides on a servers, laptops or desktop computers. • Off-site and on-site backups should occur at regular intervals to meet individual clients’ needs. • Backups should occur rapidly and seamlessly to avoid interfering with server performance while the backup process is being executed. 8
  • 9. Factors to consider when selecting a solution • For best results, off-site backup should be provided at a hardened, secure data center, and that has a high level of physical security in place along with internet and power redundancy. Data should be secure on-site as well as off-site by using a high level of encryption. The encryption key should be kept in a secure location either by the end-client themselves, or their respective solution provider. • The Backup and Disaster Recovery solution should restore server images to dissimilar hardware. This is essential, as it prevents customers from being limited by the type of new server that will be installed. 9
  • 10. A Comprehensive Solution Must Protect Valuable Data & Minimize Downtime! 10
  • 11. Introducing MirrorCloud • MirrorCloud is business continuity software that… –Mirrors data to the SmartStyle private cloud (onsite) –Mirrors data to the Zenith public cloud (offsite) Remote Mirroring • Once a day Server • Base + incremental Zenith Local Mirroring Public • Compressed • Block-level copy Cloud • Encrypted • Uncompressed • Unencrypted SmartStyle Private Cloud 11
  • 12. Introducing “MirrorCloud “ Video Click Box below to start 12
  • 15. MirrorCloud Features • Protect Windows Desktops and Servers • Continuous Block-Level Mirroring • Quick File and Folder Level Recovery • Granular Exchange Recovery with Ontrack Power Controls • Virtualize Failed Desktops or Servers • Live Bare Metal Recovery Server SmartStyle Private Cloud 15
  • 16. MirrorCloud (The next generation in Business Continuity) 1. Pre-engineered, Linux-based Cloud Servers with solid state drives for faster virtualization when needed 2. Hypervisor loaded- Virtual Box 3. Block level backup and storage 4. Continuous Mirroring in real-time 5. Onsite, standby server 6. Stackable, scalable node-based architecture in 2TB increments 7. No obsolescence 8. Windows Servers and Desktops can be backed up 9. RAIN vs. Raid= more fault tolerance 10.Bitspread Technology=more security and fault tolerance 11.Run primary workloads-not just back up, stepping stone to virtualizing the entire environment 12. Optional Offsite storage available 16
  • 17. MirrorCloud Offsite Features • Snapshots are 256-bit encrypted • Transferred over an encrypted tunnel • Schedule offsite replication • State of the Art Data Center in Lenoir, NC • Request offsite images at any time Server Zenith Public Cloud 17
  • 18. Ask your Account Executive about Pricing and Sizing your environment with MirrorCloud Award Winning for Technology Innovation