42
Welcome to the Disaster Recovery Webinar Presenters: Steven Nichols, Director Business Development 303-383-1627 x 1104 Sean McDonald, Director IT Services 303-383-1627 x 1011 Aaron Johnson, Senior Account Manager 801-758-1045

Disaster Recovery

Embed Size (px)

DESCRIPTION

This presentation talks through Disaster Recovery for small businesses, including, planning and backup.

Citation preview

Page 1: Disaster Recovery

Welcome to the Disaster Recovery Webinar

Presenters:

Steven Nichols, Director Business Development 303-383-1627 x 1104

Sean McDonald, Director IT Services 303-383-1627 x 1011

Aaron Johnson, Senior Account Manager 801-758-1045

Page 2: Disaster Recovery

How to use the webinar interface

[email protected]

Page 3: Disaster Recovery

www.MCStech.net

Page 4: Disaster Recovery

What we will cover

What is Disaster Recovery

Nature of Disasters

Disaster Recovery planning

Why Develop a plan

What goes into a plan

Backup solutions

How to respond to a disaster

45 minutes presentation Q&A

Page 5: Disaster Recovery

Disaster Recovery/Hosted Backup Luncheon

When: Wednesday, April 28th

12:00 – 1:00Where: Denver Chop House

1735 19th StreetWhat: Hosted backup and

formal disaster recovery planning luncheon for more technical users

To register, call, email303-383-1627 x [email protected]

Page 6: Disaster Recovery

Business Continuity Planning

Disaster Recovery

How to respond to the unthinkable

Page 7: Disaster Recovery

Types of IT disasters

•Disk corruption, power surges, accidental damage

Hardware failure

•Stolen laptops, USB drives, servers, workstations

Theft of hardware

•Disgruntled employees, viruses, hackers

Malicious destruction

•Smoke damage, fire sprinklers, total loss

Fire

•Floods, earthquakes, violence, volcanoes

Things that make the news

Page 8: Disaster Recovery

37%

26%

14%

13%

10%

Frequency of Disasters

Hardware failure

Viruses and hackers

Natural Disasters, Fire, Floods

Malicious Employee behavior

Man made disasters

Page 9: Disaster Recovery

Disaster Recovery planning

Why disaster recovery planning is

important

Writing a formal document

Choosing the right pieces Backup solutions

Page 10: Disaster Recovery

Businesses with disaster recovery plans are more likely to survive

disastersCompliance with HIPAA,

SOX

Good Business Governan

ce

Small investme

nt for huge

return

6 % of companies suffering from a catastrophic data loss will survive. 43 % never reopen51 % close within two years.

-University of Texas

Page 11: Disaster Recovery

Why is it so hard to survive a loss?

Complexity of network

Data is the company

Time is Money

Order servers 0-6 daysBuild network 2-3 daysReload Data 1-3 days

Page 12: Disaster Recovery

Disaster Recovery planning

Why disaster recovery planning is

important

Writing a formal document

Choosing the right pieces Backup solutions

Page 13: Disaster Recovery

Right!

Wrong!

Where should you keep your plan?

Electronically?

Printed out?

Page 14: Disaster Recovery

What goes in the plan

Contact information

Employees

Vendors (especially

backup vendors)

Key customers

Definition of responsibilities

Who declares a disaster

Who orders the new

hardware

Who initiates the phone

tree

Budget & roadmap for rebuilding network

Hardware quotes or estimates

Plan for restoring software

Directions and schedule

for rebuilding

Full documentation

of existing system

Hardware specifications and layout

Software layout and

serial numbers

Network design

Page 15: Disaster Recovery

Disaster Recovery planning

Why disaster recovery planning is

important

Writing a formal document

Choosing the right pieces Backup solutions

Page 16: Disaster Recovery

Budget

Time to Recovery

Recovery Point

Page 17: Disaster Recovery

Recovery Point

How should IT look after recovery?

Is Identical necessary or desirable?

Is there a rally point between entirely

down and ideal?

Recovery of data vs. simple

ability to move

forward Can any data be

lost?

Compliance consideratio

ns

Page 18: Disaster Recovery

Time to recovery

System 8 hours 24 hours 48 hours 96 hours 1 weekInternet Access

Partial Functionality Fully Functional

PhonesPartial Functionality Fully Functional

Workstations Down Partial Functionality Fully Functional

Network DownPartial Functionality Fully Functional

File Share Server Down

Partial Functionality Fully Functional

Email Server Down Fully FunctionalApplications Server Down Partial Functionality

Fully Functional

Page 19: Disaster Recovery

Synchronize your needs and abilities

Business needs

Equipment availability

Human

availability

Page 20: Disaster Recovery

Budget

Pre-disaster

expenses

On-going cost

(mostly backup)

Initial cost in hours

and hardware

Post-disaster

expenses

Hardware

Software

Expense of being

down, lost revenue

Page 21: Disaster Recovery

Disaster Recovery planning

Why disaster recovery planning is

important

Writing a formal document

Choosing the right pieces Backup solutions

Page 22: Disaster Recovery

Backup solutions

USB Backu

p

Tape Backu

p

HostedDisk / Disk

Backup

Page 23: Disaster Recovery

USB Backup

Pros Cons

Unsecure

Vulnerable to some disasters

Limited storage space

Dependent on human intervention

Simple, non-technical

Quick granular restoration

Easy for small companies

Page 24: Disaster Recovery

Tape Back-up

Pros Cons

Initial cost can be high

Needs frequent testing

Dependent on human intervention

Slow to backup with large amounts of data

Very common and familiar

Full and granular recovery

Tangible, visible

Page 25: Disaster Recovery

Hosted Disk / Disk

Pros Cons

Fully Automated

Encrypted End to End

Full Disaster Recovery

Very Scalable

Monthly service

cost can scale out

of budget

Unfamiliar cloud

technology

Archiving requires

manual intervention

Page 26: Disaster Recovery

Storage in the Cloud: The Future is Now?

Page 27: Disaster Recovery

i365, A Seagate Company

Subsidiary of Seagate Technology,

a $13B Company

22,000 Satisfied

Small, Mid-Size and

Large Enterprise Customers

Over 500 employees

Operating in US, Canada, and Europe

Member Microsoft Global ISV program

• All data replicated to multiple geographies• Comprehensive DR plans for every data center • Redundant Internet connectivity

10 high availability Type IV certified data centers

• SAS-70 Type II Audited• ISO 9001 Certified Data Restoration/Migration

Labs• ISO 27001 security management program • Data encrypted at all times (at rest and in

motion)

Best in class secure and scalable

Page 28: Disaster Recovery

Internal ChallengesTechnology

Dependence

Explosive Data Growth

Application growth

Data retention

Customer correspondenc

e

Limited Resources

Managing more devices, projects, people

Supporting distributed

environments

Supporting mobile

workforce

Telecommuting, locations

Employee Expectation

s

Longer production

days

On-demand culture

Protect investments

Business Plans

Mergers, Acquisitions, Expansion

Integrating environments

Standardizing key policies

Page 29: Disaster Recovery

External Challenges

Customers - Litigation Culture

• Customer expectations

• Sensitive personal information

• Protect your company brand

• Identity theft

Government - Regulatory Compliance

• Confidentiality• Security

requirements• Accessibility• Retention

policies

Preparing for the unexpected

• High cost of downtime

• Assessing risks• Solidify

disaster recovery plans

Page 30: Disaster Recovery

Traditional Backup Process

Tape Vaulting Service

(e.g. Iron Mountain, Recall, etc.)

Backup Software(Symantec, CA, IBM, etc.)

Potential for Operating Inefficiencies

Page 31: Disaster Recovery

Traditional Recovery Process

Tapes are sent from vaulting warehouse

Tapes are delivered back to the company requesting them.

Cannot keep up with business pressures

Page 32: Disaster Recovery

32

or

Page 33: Disaster Recovery

EVault Software

Page 34: Disaster Recovery

Security MeasuresControlled Environment:

· Administrative rights, centralization, automated, eliminate unreliable third party transport services

Software Security:· Data is encrypted end to end. Customer chooses between 56-bit

Blowfish, 56-bit DES, 112-bit Triple-DES, 128-bit Blowfish, 256 and 128-bit AES encryption levels

· Customer is the sole owner of the encryption key – even EVault cannot access the data

· EVault DeltaPro™, is a self-encrypting process, adding an additional level of security

· SAS 70 Type II certified

Hardware Security:· Best of breed hardware (EMC, Dell, HP, Nexsan)· Preemptive predictable monitoring· RAID 5+ redundancy built in

Page 35: Disaster Recovery

Facility Security Measures

SunGard, Seagate

Security key card access

only

24 x 7 security guard

Facility video surveillance

Private, locked, caged vault

space

Redundant power supply

Redundant Internet

connectivity

Advanced fire detection and

fire suppression

systems

Humidity and water

detection systems

Climate controlled

Page 36: Disaster Recovery

EVault Recovery ProcessRecovery

Scenarios Recovery Options

• Online point-and-click for full recovery of files and folders via IP

Lost files and folders

• Rebuild servers directly off mass storage device, ship to off-site location, if necessary

Bare-metal restores, server rebuilds, OS

upgrades

• Data resides in hot site facility• EVault Protect QuickShipSM mobile vault for

high-level restores• On-site professional services available to

assist in recovery process

Full environment recovery, System State, Data files

Page 38: Disaster Recovery

Recovering from a Disaster

Recognize a disaster exists

Martial your forces

Follow the plan

Page 39: Disaster Recovery

• Evaluate current systems, backups, policies, documentation

• Recommendations for improvement

• Matching budget with expectations and risk

Disaster Recovery

Assessment

• Gather the contact information

• Decide on elements to include (backup)

• Build directions and budget

Develop a formal plan • Print out copies of the

plan• Install systems• Test, and evaluate

Execute the plan

Page 40: Disaster Recovery

Disaster Recovery/Hosted Backup Luncheon

When: Wednesday, April 28th

12:00 – 1:00Where: Denver Chop House

1735 19th StreetWhat: Hosted backup and

formal disaster recovery planning luncheon for more technical users

To register, call303-383-1627 x 1104

Page 41: Disaster Recovery

Questions?

Presenters:

Steven Nichols, Director Business Development 303-383-1627 x 1104

Sean McDonald, Director IT Services 303-383-1627 x 1011

Aaron Johnson, Senior Account Manager 801-758-1045

Page 42: Disaster Recovery

Steven Nichols

303-383-1627 xtn: 1104

[email protected]

Disaster Recovery Assessments are ½ price until May 15th

Disaster Recovery

Assessment

Evaluate current

systems, backups, policies,

documentation

Recommendations for

improvement

Matching budget with expectations

and risk