SlideShare a Scribd company logo
Frontier Backup & Recovery
Why do businesses need B&R?

•   Data is the lifeblood of businesses today
•   Regardless of industry – customer
    data, budget/financial, human resources,
    tax records
•   Financial industry – market trades, client
    transactions
•   Healthcare – patient records, insurance claims
•   Government – gov’t and public records
•   Manufacturing – inventory & logistics
•   Legal – trial evidence
•   Educational – student records
Today’s Data Backup Challenges

  Pain point category                   Pain points associated with a high risk solution
                          Recovery is too slow for large recoveries or disasters
    Recovery Time         High rate of recovery failures & anxiety about the next recovery
                          Not well suited for Remote Office/Branch Office backups
  Laptop Protection       Laptops cannot be protected by current solution
                          Security concerns in terms of compliance to regulations
Security & Compliance     Limited ability to reduce liability regarding aged backup data
                          Too many data security issues including agent hacking
                          Too many application disruptions or required downtime for backups
   Software Agents
                          Extremely high ongoing hidden agent costs
Expertise & Consistency   Lack of expertise leads to lack of consistency & lack of trust




                                                                                              3
•   Key causes of data loss are:

     –   78% Hardware or System
         Malfunction

     –   11% Human Error

     –   7% Software Corruption or
         Program Malfunction

     –   2% Computer Viruses

     –   1% Natural Disasters

•   Computers are machines and all
    machines eventually fail




                                     4
•   IRS Procedures (All industries)
•   HIPAA/HITECH (Healthcare)
    Health and Human Services (HHS) fines of $100
    for each civil violation, up to a maximum of
    $25,000.
    Justice Department penalties of up to $250,000
    in fines and 10 years in jail
•   Gramm Leach Bliley (Financial)
    The officers and directors of the financial
    institution shall be subject to, and shall be
    personally liable for, a civil penalty of up to
    $10,000 for each such violation
•   PCI (Payment Card Industry)
•   FINRA (Financial Industry Regulatory
    Authority) Rule 3510 & NYSE (New York
    Stock Exchange) Rule 446
•   Freedom of Information (Government)



                                                      5
What is Frontier B&R?

•   Managed service that delivers
     – Reduced costs (no hardware or
        software expense)
     – Reduced time (free up IT resources)
     – Improved efficiency (completely
        automated)
•   Business Class – individual files, business
    databases & application, & entire servers
•   Supports online (offsite), local and archive
    data protection strategies
•   Powered by Asigra software – backup &
    recovery solutions for over 20 years
How Frontier Backup & Recovery can help you
Pain point          Client Pain Points                        Frontier Backup & Recovery
              Recovery is too slow             Point & click recovery of files (recover in seconds!)
 Recovery     High rate of recovery failures   Integrity checks ensure backups were successful
              Not for Remote/Branch Office     Recover from offsite storage or local storage
 Laptops      Laptops cannot be protected      Laptops are backed up from anywhere in the world
              Security concerns in terms of    Government (FIPS 140-2) encryption using unique
 Security &   compliance to regulations        client keys
Compliance    Reduce liability of aged data    Archive aged data for historical reference & compliance
              Too many data security issues    SAS 70 Type II audited procedures and controls
 Software     Too much backup downtime         Agentless – backup all your computer from one device
  Agents      Extremely high, hidden costs     Not charged based on # of computers or applications
Expertise &
              Lack of expertise & trust        Your trusted backup & recovery experts
Consistency
•   Ensure Security & Compliance

•   Scalable for Handling Exponential
    Data Growth

•   Seek automation and validation

•   Reduce capital and operational
    expenses while providing a more
    secure solution

•   Better use your existing resources on
    core business

•   Go with a trusted partner with a
    proven track record
Frontier Backupand Recovery Presentation 110311

More Related Content

What's hot

Network Security: Physical security
Network Security: Physical security Network Security: Physical security
Network Security: Physical security
lalithambiga kamaraj
 
The Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesThe Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center Licenses
Ivanti
 
Log Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PA
Log Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PALog Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PA
Log Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PA
ControlCase
 
Integrated Compliance
Integrated ComplianceIntegrated Compliance
Integrated Compliance
Kimberly Simon MBA
 
Chapter 1 Law & Ethics
Chapter 1   Law & EthicsChapter 1   Law & Ethics
Chapter 1 Law & Ethics
Karthikeyan Dhayalan
 
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
Tripwire
 
Mca Erg Oct 09
Mca Erg Oct 09Mca Erg Oct 09
Mca Erg Oct 09
Donald Tabone
 
PCI DSS & PA DSS Version 3.0 Changes Webinar
PCI DSS & PA DSS Version 3.0 Changes WebinarPCI DSS & PA DSS Version 3.0 Changes Webinar
PCI DSS & PA DSS Version 3.0 Changes Webinar
ControlCase
 
The Dark Side of Powerful Users
The Dark Side of Powerful UsersThe Dark Side of Powerful Users
The Dark Side of Powerful Users
HelpSystems
 
Continuous Compliance Monitoring
Continuous Compliance MonitoringContinuous Compliance Monitoring
Continuous Compliance Monitoring
ControlCase
 
Cyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to KnowCyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to Know
kCura_Relativity
 
SIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBSIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBMerlin Govender
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
Mousumi Manna
 
Growing Pains for Human Resources
Growing Pains for Human ResourcesGrowing Pains for Human Resources
Growing Pains for Human Resources
Human Capital Media
 
Inform Interiors Proposal for Managed Support Services
Inform Interiors Proposal for Managed Support ServicesInform Interiors Proposal for Managed Support Services
Inform Interiors Proposal for Managed Support Servicesjoshua paul
 
Log Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringLog Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity Monitoring
ControlCase
 
Simplifying the data privacy governance quagmire building automated privacy ...
Simplifying the data privacy governance quagmire  building automated privacy ...Simplifying the data privacy governance quagmire  building automated privacy ...
Simplifying the data privacy governance quagmire building automated privacy ...
Avinash Ramineni
 
Encryption Solutions for Healthcare
Encryption Solutions for HealthcareEncryption Solutions for Healthcare
Encryption Solutions for Healthcare
Steve Dunn
 
Essential Security Control Implementation in IT
Essential Security Control Implementation in ITEssential Security Control Implementation in IT
Essential Security Control Implementation in IT
Professor Lili Saghafi
 

What's hot (19)

Network Security: Physical security
Network Security: Physical security Network Security: Physical security
Network Security: Physical security
 
The Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesThe Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center Licenses
 
Log Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PA
Log Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PALog Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PA
Log Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PA
 
Integrated Compliance
Integrated ComplianceIntegrated Compliance
Integrated Compliance
 
Chapter 1 Law & Ethics
Chapter 1   Law & EthicsChapter 1   Law & Ethics
Chapter 1 Law & Ethics
 
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
 
Mca Erg Oct 09
Mca Erg Oct 09Mca Erg Oct 09
Mca Erg Oct 09
 
PCI DSS & PA DSS Version 3.0 Changes Webinar
PCI DSS & PA DSS Version 3.0 Changes WebinarPCI DSS & PA DSS Version 3.0 Changes Webinar
PCI DSS & PA DSS Version 3.0 Changes Webinar
 
The Dark Side of Powerful Users
The Dark Side of Powerful UsersThe Dark Side of Powerful Users
The Dark Side of Powerful Users
 
Continuous Compliance Monitoring
Continuous Compliance MonitoringContinuous Compliance Monitoring
Continuous Compliance Monitoring
 
Cyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to KnowCyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to Know
 
SIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBSIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEB
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Growing Pains for Human Resources
Growing Pains for Human ResourcesGrowing Pains for Human Resources
Growing Pains for Human Resources
 
Inform Interiors Proposal for Managed Support Services
Inform Interiors Proposal for Managed Support ServicesInform Interiors Proposal for Managed Support Services
Inform Interiors Proposal for Managed Support Services
 
Log Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringLog Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity Monitoring
 
Simplifying the data privacy governance quagmire building automated privacy ...
Simplifying the data privacy governance quagmire  building automated privacy ...Simplifying the data privacy governance quagmire  building automated privacy ...
Simplifying the data privacy governance quagmire building automated privacy ...
 
Encryption Solutions for Healthcare
Encryption Solutions for HealthcareEncryption Solutions for Healthcare
Encryption Solutions for Healthcare
 
Essential Security Control Implementation in IT
Essential Security Control Implementation in ITEssential Security Control Implementation in IT
Essential Security Control Implementation in IT
 

Viewers also liked

Introduction to Computer
Introduction to ComputerIntroduction to Computer
Introduction to Computer
Pramod Ithape
 
Khalid presentation se ns
Khalid presentation se nsKhalid presentation se ns
Khalid presentation se nsKhalid Barry
 
411 3 t12_arezzo_apresentacao_call_eng
411 3 t12_arezzo_apresentacao_call_eng411 3 t12_arezzo_apresentacao_call_eng
411 3 t12_arezzo_apresentacao_call_engArezzori
 
Baumolin tauti hyvinvointipalveluiden haasteena
Baumolin tauti hyvinvointipalveluiden haasteenaBaumolin tauti hyvinvointipalveluiden haasteena
Baumolin tauti hyvinvointipalveluiden haasteenaTimoAro
 
Simple present tense iw
Simple present tense iwSimple present tense iw
Simple present tense iwIwonakorch
 
Muuttoliike & elinvoima
Muuttoliike & elinvoimaMuuttoliike & elinvoima
Muuttoliike & elinvoimaTimoAro
 
Akateeminen yrittäjyys
Akateeminen yrittäjyysAkateeminen yrittäjyys
Akateeminen yrittäjyysTimoAro
 
DBE corporate profile
DBE corporate profileDBE corporate profile
DBE corporate profile
mytrainings
 
Screen shot slideshare
Screen shot slideshareScreen shot slideshare
Screen shot slidesharefd2625
 
Renshengguan
RenshengguanRenshengguan
Renshengguan
callum0530
 
Incentivizing staff
Incentivizing staffIncentivizing staff
Incentivizing staff
Parry, Murphy and Associates
 
December 2011 - institutional presentation - dec, 2011
December 2011 - institutional presentation - dec, 2011December 2011 - institutional presentation - dec, 2011
December 2011 - institutional presentation - dec, 2011Arezzori
 
Onnistu ohjausryhmän kanssa
Onnistu ohjausryhmän kanssaOnnistu ohjausryhmän kanssa
Onnistu ohjausryhmän kanssaTimoAro
 
Gypsy chic issue 6 edited by lorraine stylianou
Gypsy chic issue 6 edited by lorraine stylianouGypsy chic issue 6 edited by lorraine stylianou
Gypsy chic issue 6 edited by lorraine stylianou
Lorraine Stylianou
 
Tyyni vai ärjyvä Satakunta 2030?
Tyyni vai ärjyvä Satakunta 2030? Tyyni vai ärjyvä Satakunta 2030?
Tyyni vai ärjyvä Satakunta 2030?
TimoAro
 
Textileindustryanalysisfinalppt 150323002150-conversion-gate01 (1)
Textileindustryanalysisfinalppt 150323002150-conversion-gate01 (1)Textileindustryanalysisfinalppt 150323002150-conversion-gate01 (1)
Textileindustryanalysisfinalppt 150323002150-conversion-gate01 (1)
Krupa Vora
 
Gypsy chic issue 10 edited by lorraine stylianou
Gypsy chic issue 10 edited by  lorraine stylianouGypsy chic issue 10 edited by  lorraine stylianou
Gypsy chic issue 10 edited by lorraine stylianou
Lorraine Stylianou
 

Viewers also liked (19)

Introduction to Computer
Introduction to ComputerIntroduction to Computer
Introduction to Computer
 
Portfolio
PortfolioPortfolio
Portfolio
 
Khalid presentation se ns
Khalid presentation se nsKhalid presentation se ns
Khalid presentation se ns
 
411 3 t12_arezzo_apresentacao_call_eng
411 3 t12_arezzo_apresentacao_call_eng411 3 t12_arezzo_apresentacao_call_eng
411 3 t12_arezzo_apresentacao_call_eng
 
Baumolin tauti hyvinvointipalveluiden haasteena
Baumolin tauti hyvinvointipalveluiden haasteenaBaumolin tauti hyvinvointipalveluiden haasteena
Baumolin tauti hyvinvointipalveluiden haasteena
 
Simple present tense iw
Simple present tense iwSimple present tense iw
Simple present tense iw
 
Muuttoliike & elinvoima
Muuttoliike & elinvoimaMuuttoliike & elinvoima
Muuttoliike & elinvoima
 
Akateeminen yrittäjyys
Akateeminen yrittäjyysAkateeminen yrittäjyys
Akateeminen yrittäjyys
 
DBE corporate profile
DBE corporate profileDBE corporate profile
DBE corporate profile
 
Screen shot slideshare
Screen shot slideshareScreen shot slideshare
Screen shot slideshare
 
Renshengguan
RenshengguanRenshengguan
Renshengguan
 
Incentivizing staff
Incentivizing staffIncentivizing staff
Incentivizing staff
 
December 2011 - institutional presentation - dec, 2011
December 2011 - institutional presentation - dec, 2011December 2011 - institutional presentation - dec, 2011
December 2011 - institutional presentation - dec, 2011
 
ClearSlide
ClearSlideClearSlide
ClearSlide
 
Onnistu ohjausryhmän kanssa
Onnistu ohjausryhmän kanssaOnnistu ohjausryhmän kanssa
Onnistu ohjausryhmän kanssa
 
Gypsy chic issue 6 edited by lorraine stylianou
Gypsy chic issue 6 edited by lorraine stylianouGypsy chic issue 6 edited by lorraine stylianou
Gypsy chic issue 6 edited by lorraine stylianou
 
Tyyni vai ärjyvä Satakunta 2030?
Tyyni vai ärjyvä Satakunta 2030? Tyyni vai ärjyvä Satakunta 2030?
Tyyni vai ärjyvä Satakunta 2030?
 
Textileindustryanalysisfinalppt 150323002150-conversion-gate01 (1)
Textileindustryanalysisfinalppt 150323002150-conversion-gate01 (1)Textileindustryanalysisfinalppt 150323002150-conversion-gate01 (1)
Textileindustryanalysisfinalppt 150323002150-conversion-gate01 (1)
 
Gypsy chic issue 10 edited by lorraine stylianou
Gypsy chic issue 10 edited by  lorraine stylianouGypsy chic issue 10 edited by  lorraine stylianou
Gypsy chic issue 10 edited by lorraine stylianou
 

Similar to Frontier Backupand Recovery Presentation 110311

End user business-continuity.pptx datto slide
End user business-continuity.pptx datto slideEnd user business-continuity.pptx datto slide
End user business-continuity.pptx datto slide
Laura Breese
 
vRescue Presentation
vRescue PresentationvRescue Presentation
vRescue PresentationvRescue
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
IBM Security
 
The Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyThe Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your Technologynerdsonsite
 
The Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyThe Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your Technology
Kevin Lloyd
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
HB Litigation Conferences
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
Joel Cardella
 
Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"
Sean Bradley
 
INFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics securityINFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics security
Joel Cardella
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5damonhough
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in Splunk
Precisely
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Precisely
 
Aureus disaster planning
Aureus   disaster planningAureus   disaster planning
Aureus disaster planning
AureusIT
 
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due DiligenceResilient Systems
 
SCADA and Control Systems Security Summit
SCADA and Control Systems Security SummitSCADA and Control Systems Security Summit
SCADA and Control Systems Security SummitNicole Waddell
 
ComResource Business Solutions
ComResource Business SolutionsComResource Business Solutions
ComResource Business Solutions
Anthony Dials
 
Michael Josephs
Michael JosephsMichael Josephs
Michael Josephs
daveGBE
 
Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Innovators
 

Similar to Frontier Backupand Recovery Presentation 110311 (20)

DCNCBC
DCNCBCDCNCBC
DCNCBC
 
End user business-continuity.pptx datto slide
End user business-continuity.pptx datto slideEnd user business-continuity.pptx datto slide
End user business-continuity.pptx datto slide
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
vRescue Presentation
vRescue PresentationvRescue Presentation
vRescue Presentation
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
 
The Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyThe Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your Technology
 
The Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyThe Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your Technology
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"
 
INFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics securityINFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics security
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in Splunk
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
 
Aureus disaster planning
Aureus   disaster planningAureus   disaster planning
Aureus disaster planning
 
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
 
SCADA and Control Systems Security Summit
SCADA and Control Systems Security SummitSCADA and Control Systems Security Summit
SCADA and Control Systems Security Summit
 
ComResource Business Solutions
ComResource Business SolutionsComResource Business Solutions
ComResource Business Solutions
 
Michael Josephs
Michael JosephsMichael Josephs
Michael Josephs
 
Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015
 

Frontier Backupand Recovery Presentation 110311

  • 1. Frontier Backup & Recovery
  • 2. Why do businesses need B&R? • Data is the lifeblood of businesses today • Regardless of industry – customer data, budget/financial, human resources, tax records • Financial industry – market trades, client transactions • Healthcare – patient records, insurance claims • Government – gov’t and public records • Manufacturing – inventory & logistics • Legal – trial evidence • Educational – student records
  • 3. Today’s Data Backup Challenges Pain point category Pain points associated with a high risk solution Recovery is too slow for large recoveries or disasters Recovery Time High rate of recovery failures & anxiety about the next recovery Not well suited for Remote Office/Branch Office backups Laptop Protection Laptops cannot be protected by current solution Security concerns in terms of compliance to regulations Security & Compliance Limited ability to reduce liability regarding aged backup data Too many data security issues including agent hacking Too many application disruptions or required downtime for backups Software Agents Extremely high ongoing hidden agent costs Expertise & Consistency Lack of expertise leads to lack of consistency & lack of trust 3
  • 4. Key causes of data loss are: – 78% Hardware or System Malfunction – 11% Human Error – 7% Software Corruption or Program Malfunction – 2% Computer Viruses – 1% Natural Disasters • Computers are machines and all machines eventually fail 4
  • 5. IRS Procedures (All industries) • HIPAA/HITECH (Healthcare) Health and Human Services (HHS) fines of $100 for each civil violation, up to a maximum of $25,000. Justice Department penalties of up to $250,000 in fines and 10 years in jail • Gramm Leach Bliley (Financial) The officers and directors of the financial institution shall be subject to, and shall be personally liable for, a civil penalty of up to $10,000 for each such violation • PCI (Payment Card Industry) • FINRA (Financial Industry Regulatory Authority) Rule 3510 & NYSE (New York Stock Exchange) Rule 446 • Freedom of Information (Government) 5
  • 6. What is Frontier B&R? • Managed service that delivers – Reduced costs (no hardware or software expense) – Reduced time (free up IT resources) – Improved efficiency (completely automated) • Business Class – individual files, business databases & application, & entire servers • Supports online (offsite), local and archive data protection strategies • Powered by Asigra software – backup & recovery solutions for over 20 years
  • 7. How Frontier Backup & Recovery can help you Pain point Client Pain Points Frontier Backup & Recovery Recovery is too slow Point & click recovery of files (recover in seconds!) Recovery High rate of recovery failures Integrity checks ensure backups were successful Not for Remote/Branch Office Recover from offsite storage or local storage Laptops Laptops cannot be protected Laptops are backed up from anywhere in the world Security concerns in terms of Government (FIPS 140-2) encryption using unique Security & compliance to regulations client keys Compliance Reduce liability of aged data Archive aged data for historical reference & compliance Too many data security issues SAS 70 Type II audited procedures and controls Software Too much backup downtime Agentless – backup all your computer from one device Agents Extremely high, hidden costs Not charged based on # of computers or applications Expertise & Lack of expertise & trust Your trusted backup & recovery experts Consistency
  • 8.
  • 9.
  • 10. Ensure Security & Compliance • Scalable for Handling Exponential Data Growth • Seek automation and validation • Reduce capital and operational expenses while providing a more secure solution • Better use your existing resources on core business • Go with a trusted partner with a proven track record

Editor's Notes

  1. Presenter: Dave Kerr
  2. Presenter: Marc Gonzalez