2. i365, A Seagate Company
Subsidiary of
Seagate
Technology,
a $13B
Company
22,000
Satisfied
Small, Mid-
Size and
Large
Enterprise
Customers
Over 500
employees
Operating in
US, Canada,
and Europe
Member
Microsoft
Global ISV
program
• All data replicated to multiple geographies
• Comprehensive DR plans for every data center
• Redundant Internet connectivity
10 high availability Type IV certified data centers
• SAS-70 Type II Audited
• ISO 9001 Certified Data Restoration/Migration Labs
• ISO 27001 security management program
• Data encrypted at all times (at rest and in motion)
Best in class secure and scalable
3. Internal Challenges
Technology
Dependence
Explosive Data
Growth
Application
growth
Data retention
Customer
correspondence
Limited
Resources
Managing more
devices,
projects, people
Supporting
distributed
environments
Supporting
mobile
workforce
Telecommuting,
locations
Employee
Expectations
Longer
production days
On-demand
culture
Protect
investments
Business
Plans
Mergers,
Acquisitions,
Expansion
Integrating
environments
Standardizing
key policies
4. External Challenges
Customers -
Litigation Culture
• Customer
expectations
• Sensitive
personal
information
• Protect your
company brand
• Identity theft
Government -
Regulatory
Compliance
• Confidentiality
• Security
requirements
• Accessibility
• Retention
policies
Preparing for the
unexpected
• High cost of
downtime
• Assessing risks
• Solidify disaster
recovery plans
5. Traditional Backup Process
Tape Vaulting Service
(e.g. Iron Mountain, Recall, etc.)
Backup Software
(Symantec, CA, IBM, etc.)
Potential for Operating Inefficiencies
6. Traditional Recovery Process
Tapes are sent from
vaulting warehouse
Tapes are delivered back to the
company requesting them.
Cannot keep up with business pressures
8. Security Measures
Controlled Environment:
Administrative rights, centralization, automated, eliminate unreliable third
party transport services
Software Security:
Data is encrypted end to end. Customer chooses between 56-bit Blowfish,
56-bit DES, 112-bit Triple-DES, 128-bit Blowfish, 256 and 128-bit AES
encryption levels
Customer is the sole owner of the encryption key – even EVault cannot
access the data
EVault DeltaPro™, is a self-encrypting process, adding an additional level of
security
SAS 70 Type II certified
Hardware Security:
Best of breed hardware (EMC, Dell, HP, Nexsan)
Preemptive predictable monitoring
RAID 5+ redundancy built in