SlideShare a Scribd company logo
1 of 19
Eliminate Disaster with a 
Recovery & Continuity Strategy 
Presented by 
Peter Miles Tiffany Bloomer
Who We Are
Backups & Disaster Recovery
Test Your Backups!
Be Prepared
Easy Solution?
Disaster-Proof Your IT
Virtualization
3-2-1 Backup Rule 
3 Copies 
2 Types of Media 
1 Copy Offsite
Cut Down TTR
Ways to Save on Offsite DR
Configuration Challenges
Solution: Backup Configurations 
Schedule
Easy & Executable
Aventis Systems: Disaster Recovery 
✓ Plan 
✓ Analyze 
✓ Configure & Reinstall 
✓ Restore 
✓ Standby
For All IT Departments
Disaster Recovery Planning 
1. Consider Virtualization 
2. 3-2-1 Backup Rule 
3. Offsite DR 
4. Backup Configurations 
5. Consider External Partner
Contact Us 
Services@Aventis.Systems 
www.Aventis.Systems
Thank You! 
www.Aventis.Systems

More Related Content

What's hot

Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery Planmhdpaknejad
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanCreating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanRishu Mehra
 
Disaster Recovery Planning
Disaster Recovery Planning   Disaster Recovery Planning
Disaster Recovery Planning Keystone IT
 
Recovery Time Objective and Recovery Point Objective
Recovery Time Objective and Recovery Point ObjectiveRecovery Time Objective and Recovery Point Objective
Recovery Time Objective and Recovery Point ObjectiveYankee Maharjan
 
4.2 srinivasan seshadri of t20s, one dayers and test matches sd
4.2 srinivasan seshadri   of t20s, one dayers and test matches sd4.2 srinivasan seshadri   of t20s, one dayers and test matches sd
4.2 srinivasan seshadri of t20s, one dayers and test matches sdTheBCI
 
Effective Business Continuity Plan Powerpoint Presentation Slides
Effective Business Continuity Plan Powerpoint Presentation SlidesEffective Business Continuity Plan Powerpoint Presentation Slides
Effective Business Continuity Plan Powerpoint Presentation SlidesSlideTeam
 
Disaster recovery plan sample 2
Disaster recovery plan sample 2Disaster recovery plan sample 2
Disaster recovery plan sample 2AbenetAsmellash
 
L008 Disaster Recovery Plan (2016)
L008 Disaster Recovery Plan (2016)L008 Disaster Recovery Plan (2016)
L008 Disaster Recovery Plan (2016)Jan Wong
 
5.2 alok nigam putting the bcp to ork - use of automation sd
5.2 alok nigam   putting the bcp to ork - use of automation sd5.2 alok nigam   putting the bcp to ork - use of automation sd
5.2 alok nigam putting the bcp to ork - use of automation sdTheBCI
 
Business Continuity: How to Eliminate Downtime
Business Continuity: How to Eliminate DowntimeBusiness Continuity: How to Eliminate Downtime
Business Continuity: How to Eliminate DowntimeNamtek Consulting Services
 
How to write an IT DR plan
How to write an IT DR planHow to write an IT DR plan
How to write an IT DR planDatabarracks
 
5 reasons to outsource I.T. with MultiTRENDS
5 reasons to outsource I.T. with MultiTRENDS5 reasons to outsource I.T. with MultiTRENDS
5 reasons to outsource I.T. with MultiTRENDSMultiTRENDS
 
Risk Assessment (Project: Cosmic Constructor)
Risk Assessment (Project: Cosmic Constructor)Risk Assessment (Project: Cosmic Constructor)
Risk Assessment (Project: Cosmic Constructor)MagicalPotato9000
 
Business continuity plan
Business continuity planBusiness continuity plan
Business continuity planSafwan Hashmi
 
Information system managment disaster recovery
Information system managment disaster recoveryInformation system managment disaster recovery
Information system managment disaster recoveryRavi Singh Shekhawat
 

What's hot (18)

Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery Plan
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanCreating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery Plan
 
Disaster Recovery Planning
Disaster Recovery Planning   Disaster Recovery Planning
Disaster Recovery Planning
 
Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery Plan
 
Recovery Time Objective and Recovery Point Objective
Recovery Time Objective and Recovery Point ObjectiveRecovery Time Objective and Recovery Point Objective
Recovery Time Objective and Recovery Point Objective
 
Document the drp now
Document the drp nowDocument the drp now
Document the drp now
 
4.2 srinivasan seshadri of t20s, one dayers and test matches sd
4.2 srinivasan seshadri   of t20s, one dayers and test matches sd4.2 srinivasan seshadri   of t20s, one dayers and test matches sd
4.2 srinivasan seshadri of t20s, one dayers and test matches sd
 
Effective Business Continuity Plan Powerpoint Presentation Slides
Effective Business Continuity Plan Powerpoint Presentation SlidesEffective Business Continuity Plan Powerpoint Presentation Slides
Effective Business Continuity Plan Powerpoint Presentation Slides
 
Disaster recovery plan sample 2
Disaster recovery plan sample 2Disaster recovery plan sample 2
Disaster recovery plan sample 2
 
L008 Disaster Recovery Plan (2016)
L008 Disaster Recovery Plan (2016)L008 Disaster Recovery Plan (2016)
L008 Disaster Recovery Plan (2016)
 
5.2 alok nigam putting the bcp to ork - use of automation sd
5.2 alok nigam   putting the bcp to ork - use of automation sd5.2 alok nigam   putting the bcp to ork - use of automation sd
5.2 alok nigam putting the bcp to ork - use of automation sd
 
Disaster Recover : 10 tips for disaster recovery planning
Disaster Recover : 10 tips for disaster recovery planningDisaster Recover : 10 tips for disaster recovery planning
Disaster Recover : 10 tips for disaster recovery planning
 
Business Continuity: How to Eliminate Downtime
Business Continuity: How to Eliminate DowntimeBusiness Continuity: How to Eliminate Downtime
Business Continuity: How to Eliminate Downtime
 
How to write an IT DR plan
How to write an IT DR planHow to write an IT DR plan
How to write an IT DR plan
 
5 reasons to outsource I.T. with MultiTRENDS
5 reasons to outsource I.T. with MultiTRENDS5 reasons to outsource I.T. with MultiTRENDS
5 reasons to outsource I.T. with MultiTRENDS
 
Risk Assessment (Project: Cosmic Constructor)
Risk Assessment (Project: Cosmic Constructor)Risk Assessment (Project: Cosmic Constructor)
Risk Assessment (Project: Cosmic Constructor)
 
Business continuity plan
Business continuity planBusiness continuity plan
Business continuity plan
 
Information system managment disaster recovery
Information system managment disaster recoveryInformation system managment disaster recovery
Information system managment disaster recovery
 

Viewers also liked

Oil Recovery And Disaster Strategies
Oil Recovery And Disaster StrategiesOil Recovery And Disaster Strategies
Oil Recovery And Disaster Strategiessnookala
 
Knowledge and technology in exploration
Knowledge and technology in explorationKnowledge and technology in exploration
Knowledge and technology in explorationStatoil
 
PMI strategy in managing disaster response and preparedness
PMI strategy in managing disaster response and preparedness   PMI strategy in managing disaster response and preparedness
PMI strategy in managing disaster response and preparedness Arifin Muhammad Hadi
 
The importance of Community Participation for Post-Disaster Rehabilitation
The importance of Community Participation for Post-Disaster RehabilitationThe importance of Community Participation for Post-Disaster Rehabilitation
The importance of Community Participation for Post-Disaster RehabilitationMadhavi D Vitharanage
 
Disaster Response and Recovery: Salvage Issues and Concerns
Disaster Response and Recovery: Salvage Issues and ConcernsDisaster Response and Recovery: Salvage Issues and Concerns
Disaster Response and Recovery: Salvage Issues and ConcernsFe Angela Verzosa
 
Business Continuity and Disaster Recovery Strategy
Business Continuity and Disaster Recovery Strategy Business Continuity and Disaster Recovery Strategy
Business Continuity and Disaster Recovery Strategy Chandrak Trivedi
 

Viewers also liked (8)

Oil Recovery And Disaster Strategies
Oil Recovery And Disaster StrategiesOil Recovery And Disaster Strategies
Oil Recovery And Disaster Strategies
 
Knowledge and technology in exploration
Knowledge and technology in explorationKnowledge and technology in exploration
Knowledge and technology in exploration
 
PMI strategy in managing disaster response and preparedness
PMI strategy in managing disaster response and preparedness   PMI strategy in managing disaster response and preparedness
PMI strategy in managing disaster response and preparedness
 
The importance of Community Participation for Post-Disaster Rehabilitation
The importance of Community Participation for Post-Disaster RehabilitationThe importance of Community Participation for Post-Disaster Rehabilitation
The importance of Community Participation for Post-Disaster Rehabilitation
 
Disaster Response and Recovery: Salvage Issues and Concerns
Disaster Response and Recovery: Salvage Issues and ConcernsDisaster Response and Recovery: Salvage Issues and Concerns
Disaster Response and Recovery: Salvage Issues and Concerns
 
Business Continuity and Disaster Recovery Strategy
Business Continuity and Disaster Recovery Strategy Business Continuity and Disaster Recovery Strategy
Business Continuity and Disaster Recovery Strategy
 
Disaster management
Disaster managementDisaster management
Disaster management
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar to Eliminate Disaster with a Recovery & Continuity Strategy

The Great Disconnect of Data Protection: Perception, Reality and Best Practices
The Great Disconnect of Data Protection: Perception, Reality and Best PracticesThe Great Disconnect of Data Protection: Perception, Reality and Best Practices
The Great Disconnect of Data Protection: Perception, Reality and Best Practicesiland Cloud
 
Webinar: Preparing for Disasters that Will Actually Happen
Webinar: Preparing for Disasters that Will Actually HappenWebinar: Preparing for Disasters that Will Actually Happen
Webinar: Preparing for Disasters that Will Actually HappenStorage Switzerland
 
Webinar: 2018 Disaster Recovery Checklist - 5 Key Areas to Improve
Webinar: 2018 Disaster Recovery Checklist - 5 Key Areas to ImproveWebinar: 2018 Disaster Recovery Checklist - 5 Key Areas to Improve
Webinar: 2018 Disaster Recovery Checklist - 5 Key Areas to ImproveStorage Switzerland
 
What is dr and bc 12-2017
What is dr and bc 12-2017What is dr and bc 12-2017
What is dr and bc 12-2017Atef Yassin
 
Disaster Recovery & Business Continuity Overview
Disaster Recovery & Business Continuity Overview Disaster Recovery & Business Continuity Overview
Disaster Recovery & Business Continuity Overview Aventis Systems, Inc.
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data  Disaster  Recovery  PlanCreating And Implementing A Data  Disaster  Recovery  Plan
Creating And Implementing A Data Disaster Recovery PlanRishu Mehra
 
ISOL 533 - Information Security and Risk Management DIS.docx
ISOL 533 - Information Security and Risk Management        DIS.docxISOL 533 - Information Security and Risk Management        DIS.docx
ISOL 533 - Information Security and Risk Management DIS.docxvrickens
 
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...CloudSmartz
 
Webinar: How to Create a Disaster Recovery (DR) Plan that Actually Works
Webinar: How to Create a Disaster Recovery (DR) Plan that Actually WorksWebinar: How to Create a Disaster Recovery (DR) Plan that Actually Works
Webinar: How to Create a Disaster Recovery (DR) Plan that Actually WorksStorage Switzerland
 
Task 1.Complete the BIA table below and use it for the remai
Task 1.Complete the BIA table below and use it for the remaiTask 1.Complete the BIA table below and use it for the remai
Task 1.Complete the BIA table below and use it for the remaialehosickg3
 
Varrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationVarrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationAndrew Miller
 
Backups and Disaster Recovery for Nonprofits
Backups and Disaster Recovery for NonprofitsBackups and Disaster Recovery for Nonprofits
Backups and Disaster Recovery for NonprofitsCommunity IT Innovators
 
Data backup and disaster recovery
Data backup and disaster recoveryData backup and disaster recovery
Data backup and disaster recoverycatacutanjcsantos
 
PLAN DE CONTINGENCIA.pdf
PLAN DE CONTINGENCIA.pdfPLAN DE CONTINGENCIA.pdf
PLAN DE CONTINGENCIA.pdfjosemaza20
 
15 Minute Ransomware Survival Guide
15 Minute Ransomware Survival Guide15 Minute Ransomware Survival Guide
15 Minute Ransomware Survival GuideStorage Switzerland
 
Data Recovery Best Practices - Survival of the Fittest
Data Recovery Best Practices - Survival of the FittestData Recovery Best Practices - Survival of the Fittest
Data Recovery Best Practices - Survival of the FittestNet at Work
 
Backup & Disaster Recovery for Business Owners & Directors
Backup & Disaster Recovery for Business Owners & DirectorsBackup & Disaster Recovery for Business Owners & Directors
Backup & Disaster Recovery for Business Owners & DirectorsLucy Denver
 
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...Net at Work
 

Similar to Eliminate Disaster with a Recovery & Continuity Strategy (20)

The Great Disconnect of Data Protection: Perception, Reality and Best Practices
The Great Disconnect of Data Protection: Perception, Reality and Best PracticesThe Great Disconnect of Data Protection: Perception, Reality and Best Practices
The Great Disconnect of Data Protection: Perception, Reality and Best Practices
 
Webinar: Preparing for Disasters that Will Actually Happen
Webinar: Preparing for Disasters that Will Actually HappenWebinar: Preparing for Disasters that Will Actually Happen
Webinar: Preparing for Disasters that Will Actually Happen
 
Webinar: 2018 Disaster Recovery Checklist - 5 Key Areas to Improve
Webinar: 2018 Disaster Recovery Checklist - 5 Key Areas to ImproveWebinar: 2018 Disaster Recovery Checklist - 5 Key Areas to Improve
Webinar: 2018 Disaster Recovery Checklist - 5 Key Areas to Improve
 
What is dr and bc 12-2017
What is dr and bc 12-2017What is dr and bc 12-2017
What is dr and bc 12-2017
 
Disaster Recovery & Business Continuity Overview
Disaster Recovery & Business Continuity Overview Disaster Recovery & Business Continuity Overview
Disaster Recovery & Business Continuity Overview
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data  Disaster  Recovery  PlanCreating And Implementing A Data  Disaster  Recovery  Plan
Creating And Implementing A Data Disaster Recovery Plan
 
Disaster Proof
Disaster ProofDisaster Proof
Disaster Proof
 
ISOL 533 - Information Security and Risk Management DIS.docx
ISOL 533 - Information Security and Risk Management        DIS.docxISOL 533 - Information Security and Risk Management        DIS.docx
ISOL 533 - Information Security and Risk Management DIS.docx
 
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
 
Webinar: How to Create a Disaster Recovery (DR) Plan that Actually Works
Webinar: How to Create a Disaster Recovery (DR) Plan that Actually WorksWebinar: How to Create a Disaster Recovery (DR) Plan that Actually Works
Webinar: How to Create a Disaster Recovery (DR) Plan that Actually Works
 
Task 1.Complete the BIA table below and use it for the remai
Task 1.Complete the BIA table below and use it for the remaiTask 1.Complete the BIA table below and use it for the remai
Task 1.Complete the BIA table below and use it for the remai
 
Varrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationVarrow Madness 2014 DR Presentation
Varrow Madness 2014 DR Presentation
 
Backups and Disaster Recovery for Nonprofits
Backups and Disaster Recovery for NonprofitsBackups and Disaster Recovery for Nonprofits
Backups and Disaster Recovery for Nonprofits
 
Data backup and disaster recovery
Data backup and disaster recoveryData backup and disaster recovery
Data backup and disaster recovery
 
PLAN DE CONTINGENCIA.pdf
PLAN DE CONTINGENCIA.pdfPLAN DE CONTINGENCIA.pdf
PLAN DE CONTINGENCIA.pdf
 
The Ultimate Data Protection Solution
The Ultimate Data Protection SolutionThe Ultimate Data Protection Solution
The Ultimate Data Protection Solution
 
15 Minute Ransomware Survival Guide
15 Minute Ransomware Survival Guide15 Minute Ransomware Survival Guide
15 Minute Ransomware Survival Guide
 
Data Recovery Best Practices - Survival of the Fittest
Data Recovery Best Practices - Survival of the FittestData Recovery Best Practices - Survival of the Fittest
Data Recovery Best Practices - Survival of the Fittest
 
Backup & Disaster Recovery for Business Owners & Directors
Backup & Disaster Recovery for Business Owners & DirectorsBackup & Disaster Recovery for Business Owners & Directors
Backup & Disaster Recovery for Business Owners & Directors
 
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
 

More from Aventis Systems, Inc.

Remote Desktop Services - Who Needs It?
Remote Desktop Services - Who Needs It?Remote Desktop Services - Who Needs It?
Remote Desktop Services - Who Needs It?Aventis Systems, Inc.
 
The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14Aventis Systems, Inc.
 
Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]
Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]
Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]Aventis Systems, Inc.
 
The Case for SSDs - Market Domination & Why You Need Them in Your Environment
The Case for SSDs - Market Domination & Why You Need Them in Your EnvironmentThe Case for SSDs - Market Domination & Why You Need Them in Your Environment
The Case for SSDs - Market Domination & Why You Need Them in Your EnvironmentAventis Systems, Inc.
 
Benefits of Upgrading to Windows 10 in the Government Sector
Benefits of Upgrading to Windows 10 in the Government SectorBenefits of Upgrading to Windows 10 in the Government Sector
Benefits of Upgrading to Windows 10 in the Government SectorAventis Systems, Inc.
 
Why Government Agencies Should Consider Dell 13th Gen Servers
Why Government Agencies Should Consider Dell 13th Gen ServersWhy Government Agencies Should Consider Dell 13th Gen Servers
Why Government Agencies Should Consider Dell 13th Gen ServersAventis Systems, Inc.
 
Tech Spec Roundup - All-in-One Desktop PCs
Tech Spec Roundup - All-in-One Desktop PCsTech Spec Roundup - All-in-One Desktop PCs
Tech Spec Roundup - All-in-One Desktop PCsAventis Systems, Inc.
 
SMB Benefits of VPS Solutions - Availability, Security, and Support
SMB Benefits of VPS Solutions - Availability, Security, and SupportSMB Benefits of VPS Solutions - Availability, Security, and Support
SMB Benefits of VPS Solutions - Availability, Security, and SupportAventis Systems, Inc.
 
Attaching Storage to Blade Infrastructure
Attaching Storage to Blade InfrastructureAttaching Storage to Blade Infrastructure
Attaching Storage to Blade InfrastructureAventis Systems, Inc.
 
Out-of-Band Management - Why Standard Doesn’t Cut It
Out-of-Band Management - Why Standard Doesn’t Cut ItOut-of-Band Management - Why Standard Doesn’t Cut It
Out-of-Band Management - Why Standard Doesn’t Cut ItAventis Systems, Inc.
 
Government IT Budgets: Spend Now to Save Later
Government IT Budgets: Spend Now to Save LaterGovernment IT Budgets: Spend Now to Save Later
Government IT Budgets: Spend Now to Save LaterAventis Systems, Inc.
 
Product Spotlight: Red Hat Enterprise Linux for Servers and Desktops
Product Spotlight: Red Hat Enterprise Linux for Servers and DesktopsProduct Spotlight: Red Hat Enterprise Linux for Servers and Desktops
Product Spotlight: Red Hat Enterprise Linux for Servers and DesktopsAventis Systems, Inc.
 
Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?
Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?
Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?Aventis Systems, Inc.
 
Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...
Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...
Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...Aventis Systems, Inc.
 
RIP SQL Server 2005 - Time to Move On!
RIP SQL Server 2005 - Time to Move On!RIP SQL Server 2005 - Time to Move On!
RIP SQL Server 2005 - Time to Move On!Aventis Systems, Inc.
 
What to Do with Your Used IT Hardware
What to Do with Your Used IT HardwareWhat to Do with Your Used IT Hardware
What to Do with Your Used IT HardwareAventis Systems, Inc.
 
Networking Considerations for IT Labs
Networking Considerations for IT LabsNetworking Considerations for IT Labs
Networking Considerations for IT LabsAventis Systems, Inc.
 
Don’t Get Caught by Phishing Emails!
Don’t Get Caught by Phishing Emails!Don’t Get Caught by Phishing Emails!
Don’t Get Caught by Phishing Emails!Aventis Systems, Inc.
 

More from Aventis Systems, Inc. (20)

Remote Desktop Services - Who Needs It?
Remote Desktop Services - Who Needs It?Remote Desktop Services - Who Needs It?
Remote Desktop Services - Who Needs It?
 
The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14
 
Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]
Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]
Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]
 
Windows Server 2016 Licensing Tips
Windows Server 2016 Licensing TipsWindows Server 2016 Licensing Tips
Windows Server 2016 Licensing Tips
 
The Case for SSDs - Market Domination & Why You Need Them in Your Environment
The Case for SSDs - Market Domination & Why You Need Them in Your EnvironmentThe Case for SSDs - Market Domination & Why You Need Them in Your Environment
The Case for SSDs - Market Domination & Why You Need Them in Your Environment
 
Benefits of Upgrading to Windows 10 in the Government Sector
Benefits of Upgrading to Windows 10 in the Government SectorBenefits of Upgrading to Windows 10 in the Government Sector
Benefits of Upgrading to Windows 10 in the Government Sector
 
Why Government Agencies Should Consider Dell 13th Gen Servers
Why Government Agencies Should Consider Dell 13th Gen ServersWhy Government Agencies Should Consider Dell 13th Gen Servers
Why Government Agencies Should Consider Dell 13th Gen Servers
 
Tech Spec Roundup - All-in-One Desktop PCs
Tech Spec Roundup - All-in-One Desktop PCsTech Spec Roundup - All-in-One Desktop PCs
Tech Spec Roundup - All-in-One Desktop PCs
 
SMB Benefits of VPS Solutions - Availability, Security, and Support
SMB Benefits of VPS Solutions - Availability, Security, and SupportSMB Benefits of VPS Solutions - Availability, Security, and Support
SMB Benefits of VPS Solutions - Availability, Security, and Support
 
Attaching Storage to Blade Infrastructure
Attaching Storage to Blade InfrastructureAttaching Storage to Blade Infrastructure
Attaching Storage to Blade Infrastructure
 
Out-of-Band Management - Why Standard Doesn’t Cut It
Out-of-Band Management - Why Standard Doesn’t Cut ItOut-of-Band Management - Why Standard Doesn’t Cut It
Out-of-Band Management - Why Standard Doesn’t Cut It
 
Government IT Budgets: Spend Now to Save Later
Government IT Budgets: Spend Now to Save LaterGovernment IT Budgets: Spend Now to Save Later
Government IT Budgets: Spend Now to Save Later
 
Veeam Backup Essentials v9 Overview
Veeam Backup Essentials v9 OverviewVeeam Backup Essentials v9 Overview
Veeam Backup Essentials v9 Overview
 
Product Spotlight: Red Hat Enterprise Linux for Servers and Desktops
Product Spotlight: Red Hat Enterprise Linux for Servers and DesktopsProduct Spotlight: Red Hat Enterprise Linux for Servers and Desktops
Product Spotlight: Red Hat Enterprise Linux for Servers and Desktops
 
Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?
Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?
Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?
 
Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...
Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...
Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...
 
RIP SQL Server 2005 - Time to Move On!
RIP SQL Server 2005 - Time to Move On!RIP SQL Server 2005 - Time to Move On!
RIP SQL Server 2005 - Time to Move On!
 
What to Do with Your Used IT Hardware
What to Do with Your Used IT HardwareWhat to Do with Your Used IT Hardware
What to Do with Your Used IT Hardware
 
Networking Considerations for IT Labs
Networking Considerations for IT LabsNetworking Considerations for IT Labs
Networking Considerations for IT Labs
 
Don’t Get Caught by Phishing Emails!
Don’t Get Caught by Phishing Emails!Don’t Get Caught by Phishing Emails!
Don’t Get Caught by Phishing Emails!
 

Recently uploaded

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Recently uploaded (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Eliminate Disaster with a Recovery & Continuity Strategy

Editor's Notes

  1. Hello! Welcome to “Eliminate Disaster with a Recovery & Continuity Strategy.”
  2. My name is Tiffany Bloomer, Director of Business Development at Aventis Systems. Today, I have asked Peter Miles to discuss the importance of backups in a disaster recovery strategy, and tips to creating a simple and effective recovery plan. Peter is a Technical Sales Engineer here at Aventis Systems and serves as a trusted hardware and software pre-sales advisor; he also performs on-site installation and maintenance services, and provides troubleshooting assistance for our customers around the world. Thank you for joining us today, Peter! So, let’s talk disaster recovery!
  3. Thanks, Tiffany. Being in IT, it’s expected that we all have backups to some degree for disaster recovery purposes. Some backups are on a daily schedule of all systems, while others rely on one-time snapshots of their key systems with a loose schedule of incremental backups.
  4. However, recovering from backups is not something everyone does often. The major offense to backup recovery is that many IT departments have backups in place, but fail to test their backups to verify they are good and effective in the event of a failure.
  5. For today’s webinar, we are going to assume something even worse than simple data loss may happen to your business. Like any insurance policy, it pays to know what to do when the unforeseeable and unexpected happens, and be prepared to take immediate action.
  6. Tiffany Interjection Backups may seem like the easy disaster recovery solution because they can be taken using many different methods, programs, schedules, and media types. But the process of recovering your lost data, or getting up and running on replacement hardware, is something that needs to be proofed and tested, so that in the event of failure - you’re back up and running as fast as possible.
  7. Tiffany Interjection We know that disasters come in all shapes and sizes from simple file deletion, to a massive storm or power outage. Whether you need to recover an operating system after power loss, or failover to a DR site after a natural disaster, having the right backup and recovery plan is essential to any business.
  8. Right! So let’s discuss a few steps an IT department of any size can take to establish a simple and effective recovery plan. First, consider virtualization. Virtualization has become a widely used technology for SMBs for this very reason. The time it takes to provision a new virtual machine, or restore one from a backup, can be drastically less than a traditional hardware setup. When VMware’s ESXi or Microsoft’s Hyper-V are combined with backup and recovery software like Veeam, you can have a virtual machine restored in a matter of minutes, or an exact replica on standby, in the event of a disaster.
  9. Next, plan to implement the 3, 2, 1 backup rule. This means you will have 3 copies, located on 2 different media types, and 1 of these will be stored off site. Having a backup copy off site is the more important step to ensure that recovery is possible in the event that your entire building is damaged. Tiffany Interjection Now, of course this is just covers data backup. What about hardware or configurations necessary for a solid DR plan?
  10. Hardware is the most difficult thing to replace on a short timeline because of the requisitioning steps involved. If you have the ability to failover to a Disaster Recovery location with the backup hardware already in place, this cuts down on time to recovery (TTR) tremendously. Before virtualization, provisioning systems required almost as much time as the hardware requisition in the first place. Lucky for all of us, we have witnessed incredible technological strides in that area and can now package up and transfer container VMs which eliminates bare-metal deployment entirely.
  11. Having a full lineup of server hardware in place that may never even get used isn’t always a realistic scenario for most businesses. Having a third party company host your disaster recovery site allows you to have an off site disaster recovery plan in place for a fraction of the cost.
  12. Finally the most difficult part of all when migrating to the Disaster Recovery hardware platform is mirroring the tweaks and configurations that accrue over time with network devices, servers, storage and application deployments. If these are not documented or have not been packaged up as part of the VM environment backup, troubleshooting the Disaster Recovery site will take the majority of the time until the original and new configurations match.
  13. To aid with this, it is recommended to also keep a backup schedule for these configuration files which most manufacturers have built in tools to assist with. This allows the configuration of a replacement switch or server to take a matter of minutes instead of hours.
  14. Tiffany Interjection These are great points, Peter! I like how they are easy, executable points for SMB IT departments to implement right away. If they experience any issues, we also offer fantastic disaster recovery planning and resolution services.
  15. Absolutely. Under our Enterprise Solutions programming, we offer services that include preliminary planning, analysis of previous configurations, actual configuration of server and storage arrays, and reinstallation of hypervisors, operating systems, or applications post-failure. Most importantly, we will restore backed up data and settings so that they’re ready to go immediately. We offer everything from cold standby environments to live mirror sites, with the cost of downtime driving the decision between these options for the customer.
  16. Tiffany Summary IT departments of all sizes should have a plan in place to enable the continuation of vital technology infrastructure and systems, in the event of a disaster. There are several simple steps that SMB IT departments can take to build out a simple, effective disaster recovery plan:
  17. First, consider using the time-saving capabilities of virtualization. Second, implement the 3-2-1 backup rule. Third, have an off site hardware setup or a third party hosted disaster recovery site. And lastly, keep up-to-date copies of your critical configuration files. Consider an external partner to assist you with your disaster recovery planning and implementation. Aventis Systems offers our IT expertise to you in order to restore business application configurations, so your business can get back to work.
  18. Aventis Systems is an industry leader in developing customized and comprehensive IT hardware, software, and services solutions. Please visit us at www.Aventis.Systems for additional information. You can also find us on Facebook or on Twitter @AventisSystems.
  19. Thank you for tuning in!