SlideShare a Scribd company logo
1 of 11
Welcome! mirroredstorage.com ms
History of the Industry Types of Services Our Approach Benefits Summary Agenda/Topics To Be Covered
The need to backup has existed from the beginning of record keeping  Bandwidth and Storage Costs have hindered secure electronic backups Remote Storage has been used for years (.i.e. CitiGroup lost DHL magnetic tape  Large software Companies have help Large customers for >15 years (i.e. CA, EMC, Symantec) for $700k initial investment Smaller companies are not protected securely by having a Tape Drive Unit! History of the Industry
Personal Experience What we have used Problems we have had Market Offerings Very Large Companies The Gap Individuals Market Trends Why we choice this Industry?
Types of Services Easy Backup Dependable Restore Personal Offerings Limits Extra Charges Slow Start Security Snapshots Self Monitoring Business Offerings Multiple Systems Software or Appliance Security Options Flexible Scheduling Detailed Logging
Multiple Systems Servers, Desktops, Laptops, Storage Devices Software or Appliance Appliance that does all the heavy lifting We take responsibility for maintaining Security Options Flexible Scheduling As Simple or Complex as you need We will do it for you Detailed Logging We are monitoring our servers and appliance Our Business Approach “… did you check your log file? … Quote from CSR at competitor
Our Architecture
Benefits
Security Benefits More Details
Your Data is Valuable Restoring is VERY important Security is REQUIRED and VITAL  We offer MUCH more than disk space Configuration Guidance Management Summary
Q&A John Neibel President & Founder jneibel@mirroredstorage.com 214-550-0550 www.mirroredstorage.com

More Related Content

Similar to Overview

ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data ProtectionISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data ProtectionUlf Mattsson
 
Security Information Management: An introduction
Security Information Management: An introductionSecurity Information Management: An introduction
Security Information Management: An introductionSeccuris Inc.
 
Choosing A Secondary Storage
Choosing A Secondary StorageChoosing A Secondary Storage
Choosing A Secondary StorageJessica Tanner
 
SIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBSIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBMerlin Govender
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5damonhough
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planetVincent Kwon
 
Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?EMC
 
Cisco Phy Sec Overview Netversant
Cisco Phy Sec Overview   NetversantCisco Phy Sec Overview   Netversant
Cisco Phy Sec Overview NetversantJayCase
 
SGSB Webcast 3: Smart Grid IT Systems Security
SGSB Webcast 3: Smart Grid IT Systems SecuritySGSB Webcast 3: Smart Grid IT Systems Security
SGSB Webcast 3: Smart Grid IT Systems SecurityAndy Bochman
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big riskIBM Sverige
 
Solutions Overview
Solutions OverviewSolutions Overview
Solutions Overviewmelcash
 

Similar to Overview (20)

Data Protection Presentation
Data Protection PresentationData Protection Presentation
Data Protection Presentation
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
 
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data ProtectionISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
 
Security Information Management: An introduction
Security Information Management: An introductionSecurity Information Management: An introduction
Security Information Management: An introduction
 
Choosing A Secondary Storage
Choosing A Secondary StorageChoosing A Secondary Storage
Choosing A Secondary Storage
 
SIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBSIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEB
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5
 
SBDS
SBDSSBDS
SBDS
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?
 
Cisco Phy Sec Overview Netversant
Cisco Phy Sec Overview   NetversantCisco Phy Sec Overview   Netversant
Cisco Phy Sec Overview Netversant
 
Get file
Get fileGet file
Get file
 
Future Commerce 2019
Future Commerce 2019 Future Commerce 2019
Future Commerce 2019
 
SGSB Webcast 3: Smart Grid IT Systems Security
SGSB Webcast 3: Smart Grid IT Systems SecuritySGSB Webcast 3: Smart Grid IT Systems Security
SGSB Webcast 3: Smart Grid IT Systems Security
 
Cloud Storage for all
Cloud Storage for allCloud Storage for all
Cloud Storage for all
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 
Cloudstuff
CloudstuffCloudstuff
Cloudstuff
 
Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019
 
Solutions Overview
Solutions OverviewSolutions Overview
Solutions Overview
 

Overview

  • 2. History of the Industry Types of Services Our Approach Benefits Summary Agenda/Topics To Be Covered
  • 3. The need to backup has existed from the beginning of record keeping Bandwidth and Storage Costs have hindered secure electronic backups Remote Storage has been used for years (.i.e. CitiGroup lost DHL magnetic tape Large software Companies have help Large customers for >15 years (i.e. CA, EMC, Symantec) for $700k initial investment Smaller companies are not protected securely by having a Tape Drive Unit! History of the Industry
  • 4. Personal Experience What we have used Problems we have had Market Offerings Very Large Companies The Gap Individuals Market Trends Why we choice this Industry?
  • 5. Types of Services Easy Backup Dependable Restore Personal Offerings Limits Extra Charges Slow Start Security Snapshots Self Monitoring Business Offerings Multiple Systems Software or Appliance Security Options Flexible Scheduling Detailed Logging
  • 6. Multiple Systems Servers, Desktops, Laptops, Storage Devices Software or Appliance Appliance that does all the heavy lifting We take responsibility for maintaining Security Options Flexible Scheduling As Simple or Complex as you need We will do it for you Detailed Logging We are monitoring our servers and appliance Our Business Approach “… did you check your log file? … Quote from CSR at competitor
  • 10. Your Data is Valuable Restoring is VERY important Security is REQUIRED and VITAL We offer MUCH more than disk space Configuration Guidance Management Summary
  • 11. Q&A John Neibel President & Founder jneibel@mirroredstorage.com 214-550-0550 www.mirroredstorage.com

Editor's Notes

  1. WelcomeIntroductionsExpectationsGoals
  2. History of the Backup Industry and why we chose this industry to enterTypes of Service in the Remote Backup availableMirrored Storage ApproachBenefits of our offeringSummary & Next Steps
  3. History of the Industry The Need as existed forever Technical Limitations have been resolved Recent Examples of physical remote backup issuesCitiGroup via shipment of media tape of non-encrypted cardholder information Litigation of those mishaps Commercial offerings – really only available to large companies Small Companies have been relegated to inferior solutions based on cost Tape BackupsExternal Drives Implementation is the KEY!
  4. Why we choices this Industry? Personal Experience – worked for startups thru fortune 100 companies Diskettes – way to many disks Personal Tape Drive ZIP Drives CD/CDRW DVD and later DVDRW External Hard-drive Common Problem – backing up is fine, but the restore is where the NEED is! Market Offerings Large companies have done backups for years, but few have an offsite storage facility that is outside the primary data center Individual solutions - backups have just become vogue in the last 6 months The GAP! Power Users – multiple computers and/or large storage needs (guilty) Small Businesses – SOME have implemented “all information is stored on single server” but there is VALUABLE information on other computers! Medium-Large Businesses – no real control of information. I was in this space from start-up company THRU fortune 100 companies as recent as last quarter!!! Market Trends – “it’s all about the data” It’s size is only GROWING!
  5. Personal Offerings Limits 1 drive (i.e. C:) or My Documents – this is important for anyone that has multiple intelligent devices, drives or computers Storage – “Unlimited storage is not really the truth as my mom taught me” It is limited in size AND time. You have to have contract experience to find the “Got-Ya”! Extra Changes – As mentioned above when the “normal” limits are reach there ARE extra charges for things like: Storage space Uploads & Downloads (backups & restores) Slow Start Most have you start the backup and it take days to weeks to complete. Meanwhile you believe that you are covered Incremental backups also take more time “than advertized”. Security Are the keys stored on the backup server – if so you are not compliant with most of the regulations. Snapshots – schedules and backups are fixed and do not meet your requirements Self Monitoring – you are responsible for monitoring backups success’s and errorsBusiness Offerings Multiple Systems – ANY device on the network Appliance – key offering that removes the configuration and maintenance issues Security Options – Multiple options from simple to DOD standard Scheduling – completed flexible on scheduling including shutdown/resume features Detailed Logging – we manage your backups and notify you of exceptions
  6. Our Business Approach Multiple Systems – that can be mapped to a Windows drive (Win32/64, MAC, Linux, AS400/iSeries, Unix flavors, smart devices, PDA’s, etc).Appliance – does the heavy lifting and accelerates the initial implementation (copy or disk drive). Removes the configuration and maintenance issues Security Options – the KEY difference between us and the world Scheduling – complete flexibility to meet your needs Logging – We monitor and manage your environment. Without management you are on your own.
  7. Architecture Customer Side All of your company is covered File Servers Database/Email Servers Laptops Desktops Storage Devices (USB drives, SMART phone, iPod, etc) Appliance Value Central source of client side interactions Administered and Managed by Mirrored Storage Backup Side (Mirrored Storage 2 sites) Redundant servers Redundant sites Maximum convenience and protection
  8. Benefits of Mirrored Storage’s offering Security – more details to share with you Management – we monitor your backups and notify you All offerings that we tested did NOT do this We maintain the appliance for you (Operating System, Anti-Virus, Hardware, etc) We can aid in the new or changed devices for you Restore assistance done for you No Agent software to install and patch on your computers, servers or storage devices Company Wide backup of information – we handle ALL your information assets Redundancy – we maintain another copy “just in case” Technology We are using the industry leader with more than 20 years of experience. Multiple versions released per year – it is CURRENT
  9. Security Benefits of our Approach Password level Encryption You choice the type and codes – we don’t have them Emergency assistance available if you REALLY need it Appliance Level Security Your sensitive information is encrypted at the appliance at your office before it is transmitted Appliance is also capable of doing local backups for new or significant backups QUICKLY and then transmitted to our data centers Encryption Methods Multiple Options – currently 7 options Blowfish (Variable-Key) thru AES-256 (DOD certified method) More Technical information available on the website
  10. Summary Data Value – the value of your information is higher than you think! Backing Up is of NO value if you can’t restore! Security of your information is Vital & Often REQUIRED Competitive proprietary reasons Compliance Requirements What we offer is MUCH more than disk space Configuration Assistance (initially and over-time) Guidance on your backup strategy, we know what we are doing! Management of your systems provided: Appliance Log Monitoring Server Log Monitoring Proactive Notifications done as standard
  11. Questions & Answers Questions on what we do? Thoughts on what you have seen? Next Steps to progress together Evaluation – scoped together Data Risk Assessment Quiz – take it and see where you stand Sign-up – options and discounts (when applicable) Contact Us – www.mirroredstorage.com or 214-550-0550