Disaster Recovery

Preview:

DESCRIPTION

This presentation talks through Disaster Recovery for small businesses, including, planning and backup.

Citation preview

Welcome to the Disaster Recovery Webinar

Presenters:

Steven Nichols, Director Business Development 303-383-1627 x 1104

Sean McDonald, Director IT Services 303-383-1627 x 1011

Aaron Johnson, Senior Account Manager 801-758-1045

How to use the webinar interface

DR@mcstech.net

www.MCStech.net

What we will cover

What is Disaster Recovery

Nature of Disasters

Disaster Recovery planning

Why Develop a plan

What goes into a plan

Backup solutions

How to respond to a disaster

45 minutes presentation Q&A

Disaster Recovery/Hosted Backup Luncheon

When: Wednesday, April 28th

12:00 – 1:00Where: Denver Chop House

1735 19th StreetWhat: Hosted backup and

formal disaster recovery planning luncheon for more technical users

To register, call, email303-383-1627 x 1104dr@mcstech.net

Business Continuity Planning

Disaster Recovery

How to respond to the unthinkable

Types of IT disasters

•Disk corruption, power surges, accidental damage

Hardware failure

•Stolen laptops, USB drives, servers, workstations

Theft of hardware

•Disgruntled employees, viruses, hackers

Malicious destruction

•Smoke damage, fire sprinklers, total loss

Fire

•Floods, earthquakes, violence, volcanoes

Things that make the news

37%

26%

14%

13%

10%

Frequency of Disasters

Hardware failure

Viruses and hackers

Natural Disasters, Fire, Floods

Malicious Employee behavior

Man made disasters

Disaster Recovery planning

Why disaster recovery planning is

important

Writing a formal document

Choosing the right pieces Backup solutions

Businesses with disaster recovery plans are more likely to survive

disastersCompliance with HIPAA,

SOX

Good Business Governan

ce

Small investme

nt for huge

return

6 % of companies suffering from a catastrophic data loss will survive. 43 % never reopen51 % close within two years.

-University of Texas

Why is it so hard to survive a loss?

Complexity of network

Data is the company

Time is Money

Order servers 0-6 daysBuild network 2-3 daysReload Data 1-3 days

Disaster Recovery planning

Why disaster recovery planning is

important

Writing a formal document

Choosing the right pieces Backup solutions

Right!

Wrong!

Where should you keep your plan?

Electronically?

Printed out?

What goes in the plan

Contact information

Employees

Vendors (especially

backup vendors)

Key customers

Definition of responsibilities

Who declares a disaster

Who orders the new

hardware

Who initiates the phone

tree

Budget & roadmap for rebuilding network

Hardware quotes or estimates

Plan for restoring software

Directions and schedule

for rebuilding

Full documentation

of existing system

Hardware specifications and layout

Software layout and

serial numbers

Network design

Disaster Recovery planning

Why disaster recovery planning is

important

Writing a formal document

Choosing the right pieces Backup solutions

Budget

Time to Recovery

Recovery Point

Recovery Point

How should IT look after recovery?

Is Identical necessary or desirable?

Is there a rally point between entirely

down and ideal?

Recovery of data vs. simple

ability to move

forward Can any data be

lost?

Compliance consideratio

ns

Time to recovery

System 8 hours 24 hours 48 hours 96 hours 1 weekInternet Access

Partial Functionality Fully Functional

PhonesPartial Functionality Fully Functional

Workstations Down Partial Functionality Fully Functional

Network DownPartial Functionality Fully Functional

File Share Server Down

Partial Functionality Fully Functional

Email Server Down Fully FunctionalApplications Server Down Partial Functionality

Fully Functional

Synchronize your needs and abilities

Business needs

Equipment availability

Human

availability

Budget

Pre-disaster

expenses

On-going cost

(mostly backup)

Initial cost in hours

and hardware

Post-disaster

expenses

Hardware

Software

Expense of being

down, lost revenue

Disaster Recovery planning

Why disaster recovery planning is

important

Writing a formal document

Choosing the right pieces Backup solutions

Backup solutions

USB Backu

p

Tape Backu

p

HostedDisk / Disk

Backup

USB Backup

Pros Cons

Unsecure

Vulnerable to some disasters

Limited storage space

Dependent on human intervention

Simple, non-technical

Quick granular restoration

Easy for small companies

Tape Back-up

Pros Cons

Initial cost can be high

Needs frequent testing

Dependent on human intervention

Slow to backup with large amounts of data

Very common and familiar

Full and granular recovery

Tangible, visible

Hosted Disk / Disk

Pros Cons

Fully Automated

Encrypted End to End

Full Disaster Recovery

Very Scalable

Monthly service

cost can scale out

of budget

Unfamiliar cloud

technology

Archiving requires

manual intervention

Storage in the Cloud: The Future is Now?

i365, A Seagate Company

Subsidiary of Seagate Technology,

a $13B Company

22,000 Satisfied

Small, Mid-Size and

Large Enterprise Customers

Over 500 employees

Operating in US, Canada, and Europe

Member Microsoft Global ISV program

• All data replicated to multiple geographies• Comprehensive DR plans for every data center • Redundant Internet connectivity

10 high availability Type IV certified data centers

• SAS-70 Type II Audited• ISO 9001 Certified Data Restoration/Migration

Labs• ISO 27001 security management program • Data encrypted at all times (at rest and in

motion)

Best in class secure and scalable

Internal ChallengesTechnology

Dependence

Explosive Data Growth

Application growth

Data retention

Customer correspondenc

e

Limited Resources

Managing more devices, projects, people

Supporting distributed

environments

Supporting mobile

workforce

Telecommuting, locations

Employee Expectation

s

Longer production

days

On-demand culture

Protect investments

Business Plans

Mergers, Acquisitions, Expansion

Integrating environments

Standardizing key policies

External Challenges

Customers - Litigation Culture

• Customer expectations

• Sensitive personal information

• Protect your company brand

• Identity theft

Government - Regulatory Compliance

• Confidentiality• Security

requirements• Accessibility• Retention

policies

Preparing for the unexpected

• High cost of downtime

• Assessing risks• Solidify

disaster recovery plans

Traditional Backup Process

Tape Vaulting Service

(e.g. Iron Mountain, Recall, etc.)

Backup Software(Symantec, CA, IBM, etc.)

Potential for Operating Inefficiencies

Traditional Recovery Process

Tapes are sent from vaulting warehouse

Tapes are delivered back to the company requesting them.

Cannot keep up with business pressures

32

or

EVault Software

Security MeasuresControlled Environment:

· Administrative rights, centralization, automated, eliminate unreliable third party transport services

Software Security:· Data is encrypted end to end. Customer chooses between 56-bit

Blowfish, 56-bit DES, 112-bit Triple-DES, 128-bit Blowfish, 256 and 128-bit AES encryption levels

· Customer is the sole owner of the encryption key – even EVault cannot access the data

· EVault DeltaPro™, is a self-encrypting process, adding an additional level of security

· SAS 70 Type II certified

Hardware Security:· Best of breed hardware (EMC, Dell, HP, Nexsan)· Preemptive predictable monitoring· RAID 5+ redundancy built in

Facility Security Measures

SunGard, Seagate

Security key card access

only

24 x 7 security guard

Facility video surveillance

Private, locked, caged vault

space

Redundant power supply

Redundant Internet

connectivity

Advanced fire detection and

fire suppression

systems

Humidity and water

detection systems

Climate controlled

EVault Recovery ProcessRecovery

Scenarios Recovery Options

• Online point-and-click for full recovery of files and folders via IP

Lost files and folders

• Rebuild servers directly off mass storage device, ship to off-site location, if necessary

Bare-metal restores, server rebuilds, OS

upgrades

• Data resides in hot site facility• EVault Protect QuickShipSM mobile vault for

high-level restores• On-site professional services available to

assist in recovery process

Full environment recovery, System State, Data files

Recovering from a Disaster

Recognize a disaster exists

Martial your forces

Follow the plan

• Evaluate current systems, backups, policies, documentation

• Recommendations for improvement

• Matching budget with expectations and risk

Disaster Recovery

Assessment

• Gather the contact information

• Decide on elements to include (backup)

• Build directions and budget

Develop a formal plan • Print out copies of the

plan• Install systems• Test, and evaluate

Execute the plan

Disaster Recovery/Hosted Backup Luncheon

When: Wednesday, April 28th

12:00 – 1:00Where: Denver Chop House

1735 19th StreetWhat: Hosted backup and

formal disaster recovery planning luncheon for more technical users

To register, call303-383-1627 x 1104

Questions?

Presenters:

Steven Nichols, Director Business Development 303-383-1627 x 1104

Sean McDonald, Director IT Services 303-383-1627 x 1011

Aaron Johnson, Senior Account Manager 801-758-1045

Steven Nichols

303-383-1627 xtn: 1104

dr@mcstech.net

Disaster Recovery Assessments are ½ price until May 15th

Disaster Recovery

Assessment

Evaluate current

systems, backups, policies,

documentation

Recommendations for

improvement

Matching budget with expectations

and risk

Recommended