disaster recovery
DESCRIPTION
This presentation talks through Disaster Recovery for small businesses, including, planning and backup.TRANSCRIPT
Welcome to the Disaster Recovery Webinar
Presenters:
Steven Nichols, Director Business Development 303-383-1627 x 1104
Sean McDonald, Director IT Services 303-383-1627 x 1011
Aaron Johnson, Senior Account Manager 801-758-1045
How to use the webinar interface
www.MCStech.net
What we will cover
What is Disaster Recovery
Nature of Disasters
Disaster Recovery planning
Why Develop a plan
What goes into a plan
Backup solutions
How to respond to a disaster
45 minutes presentation Q&A
Disaster Recovery/Hosted Backup Luncheon
When: Wednesday, April 28th
12:00 – 1:00Where: Denver Chop House
1735 19th StreetWhat: Hosted backup and
formal disaster recovery planning luncheon for more technical users
To register, call, email303-383-1627 x [email protected]
Business Continuity Planning
Disaster Recovery
How to respond to the unthinkable
Types of IT disasters
•Disk corruption, power surges, accidental damage
Hardware failure
•Stolen laptops, USB drives, servers, workstations
Theft of hardware
•Disgruntled employees, viruses, hackers
Malicious destruction
•Smoke damage, fire sprinklers, total loss
Fire
•Floods, earthquakes, violence, volcanoes
Things that make the news
37%
26%
14%
13%
10%
Frequency of Disasters
Hardware failure
Viruses and hackers
Natural Disasters, Fire, Floods
Malicious Employee behavior
Man made disasters
Disaster Recovery planning
Why disaster recovery planning is
important
Writing a formal document
Choosing the right pieces Backup solutions
Businesses with disaster recovery plans are more likely to survive
disastersCompliance with HIPAA,
SOX
Good Business Governan
ce
Small investme
nt for huge
return
6 % of companies suffering from a catastrophic data loss will survive. 43 % never reopen51 % close within two years.
-University of Texas
Why is it so hard to survive a loss?
Complexity of network
Data is the company
Time is Money
Order servers 0-6 daysBuild network 2-3 daysReload Data 1-3 days
Disaster Recovery planning
Why disaster recovery planning is
important
Writing a formal document
Choosing the right pieces Backup solutions
Right!
Wrong!
Where should you keep your plan?
Electronically?
Printed out?
What goes in the plan
Contact information
Employees
Vendors (especially
backup vendors)
Key customers
Definition of responsibilities
Who declares a disaster
Who orders the new
hardware
Who initiates the phone
tree
Budget & roadmap for rebuilding network
Hardware quotes or estimates
Plan for restoring software
Directions and schedule
for rebuilding
Full documentation
of existing system
Hardware specifications and layout
Software layout and
serial numbers
Network design
Disaster Recovery planning
Why disaster recovery planning is
important
Writing a formal document
Choosing the right pieces Backup solutions
Budget
Time to Recovery
Recovery Point
Recovery Point
How should IT look after recovery?
Is Identical necessary or desirable?
Is there a rally point between entirely
down and ideal?
Recovery of data vs. simple
ability to move
forward Can any data be
lost?
Compliance consideratio
ns
Time to recovery
System 8 hours 24 hours 48 hours 96 hours 1 weekInternet Access
Partial Functionality Fully Functional
PhonesPartial Functionality Fully Functional
Workstations Down Partial Functionality Fully Functional
Network DownPartial Functionality Fully Functional
File Share Server Down
Partial Functionality Fully Functional
Email Server Down Fully FunctionalApplications Server Down Partial Functionality
Fully Functional
Synchronize your needs and abilities
Business needs
Equipment availability
Human
availability
Budget
Pre-disaster
expenses
On-going cost
(mostly backup)
Initial cost in hours
and hardware
Post-disaster
expenses
Hardware
Software
Expense of being
down, lost revenue
Disaster Recovery planning
Why disaster recovery planning is
important
Writing a formal document
Choosing the right pieces Backup solutions
Backup solutions
USB Backu
p
Tape Backu
p
HostedDisk / Disk
Backup
USB Backup
Pros Cons
Unsecure
Vulnerable to some disasters
Limited storage space
Dependent on human intervention
Simple, non-technical
Quick granular restoration
Easy for small companies
Tape Back-up
Pros Cons
Initial cost can be high
Needs frequent testing
Dependent on human intervention
Slow to backup with large amounts of data
Very common and familiar
Full and granular recovery
Tangible, visible
Hosted Disk / Disk
Pros Cons
Fully Automated
Encrypted End to End
Full Disaster Recovery
Very Scalable
Monthly service
cost can scale out
of budget
Unfamiliar cloud
technology
Archiving requires
manual intervention
Storage in the Cloud: The Future is Now?
i365, A Seagate Company
Subsidiary of Seagate Technology,
a $13B Company
22,000 Satisfied
Small, Mid-Size and
Large Enterprise Customers
Over 500 employees
Operating in US, Canada, and Europe
Member Microsoft Global ISV program
• All data replicated to multiple geographies• Comprehensive DR plans for every data center • Redundant Internet connectivity
10 high availability Type IV certified data centers
• SAS-70 Type II Audited• ISO 9001 Certified Data Restoration/Migration
Labs• ISO 27001 security management program • Data encrypted at all times (at rest and in
motion)
Best in class secure and scalable
Internal ChallengesTechnology
Dependence
Explosive Data Growth
Application growth
Data retention
Customer correspondenc
e
Limited Resources
Managing more devices, projects, people
Supporting distributed
environments
Supporting mobile
workforce
Telecommuting, locations
Employee Expectation
s
Longer production
days
On-demand culture
Protect investments
Business Plans
Mergers, Acquisitions, Expansion
Integrating environments
Standardizing key policies
External Challenges
Customers - Litigation Culture
• Customer expectations
• Sensitive personal information
• Protect your company brand
• Identity theft
Government - Regulatory Compliance
• Confidentiality• Security
requirements• Accessibility• Retention
policies
Preparing for the unexpected
• High cost of downtime
• Assessing risks• Solidify
disaster recovery plans
Traditional Backup Process
Tape Vaulting Service
(e.g. Iron Mountain, Recall, etc.)
Backup Software(Symantec, CA, IBM, etc.)
Potential for Operating Inefficiencies
Traditional Recovery Process
Tapes are sent from vaulting warehouse
Tapes are delivered back to the company requesting them.
Cannot keep up with business pressures
32
or
EVault Software
Security MeasuresControlled Environment:
· Administrative rights, centralization, automated, eliminate unreliable third party transport services
Software Security:· Data is encrypted end to end. Customer chooses between 56-bit
Blowfish, 56-bit DES, 112-bit Triple-DES, 128-bit Blowfish, 256 and 128-bit AES encryption levels
· Customer is the sole owner of the encryption key – even EVault cannot access the data
· EVault DeltaPro™, is a self-encrypting process, adding an additional level of security
· SAS 70 Type II certified
Hardware Security:· Best of breed hardware (EMC, Dell, HP, Nexsan)· Preemptive predictable monitoring· RAID 5+ redundancy built in
Facility Security Measures
SunGard, Seagate
Security key card access
only
24 x 7 security guard
Facility video surveillance
Private, locked, caged vault
space
Redundant power supply
Redundant Internet
connectivity
Advanced fire detection and
fire suppression
systems
Humidity and water
detection systems
Climate controlled
EVault Recovery ProcessRecovery
Scenarios Recovery Options
• Online point-and-click for full recovery of files and folders via IP
Lost files and folders
• Rebuild servers directly off mass storage device, ship to off-site location, if necessary
Bare-metal restores, server rebuilds, OS
upgrades
• Data resides in hot site facility• EVault Protect QuickShipSM mobile vault for
high-level restores• On-site professional services available to
assist in recovery process
Full environment recovery, System State, Data files
Enterprise Customers
Recovering from a Disaster
Recognize a disaster exists
Martial your forces
Follow the plan
• Evaluate current systems, backups, policies, documentation
• Recommendations for improvement
• Matching budget with expectations and risk
Disaster Recovery
Assessment
• Gather the contact information
• Decide on elements to include (backup)
• Build directions and budget
Develop a formal plan • Print out copies of the
plan• Install systems• Test, and evaluate
Execute the plan
Disaster Recovery/Hosted Backup Luncheon
When: Wednesday, April 28th
12:00 – 1:00Where: Denver Chop House
1735 19th StreetWhat: Hosted backup and
formal disaster recovery planning luncheon for more technical users
To register, call303-383-1627 x 1104
Questions?
Presenters:
Steven Nichols, Director Business Development 303-383-1627 x 1104
Sean McDonald, Director IT Services 303-383-1627 x 1011
Aaron Johnson, Senior Account Manager 801-758-1045
Steven Nichols
303-383-1627 xtn: 1104
Disaster Recovery Assessments are ½ price until May 15th
Disaster Recovery
Assessment
Evaluate current
systems, backups, policies,
documentation
Recommendations for
improvement
Matching budget with expectations
and risk