SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Downloaden Sie, um offline zu lesen
New Generation Data Protection
Powered by the Acronis AnyData Engine
Seven Rules of IT Disaster Recovery
Acronis Webinar
© 2015 Proprietary and Confidential 2
Mark Jameson, GM, Global DR
• Joined Acronis with the acquisition of nScaled in
September 2014
• Over 30 years of experience in the disaster
recovery and information technology markets
• Most recently, the Vice President of Global DRaaS
Sales and Marketing at nScaled
• Prior, Vice President of Sales at SunGard
Availability Services
• Earl career, held various sales and sales leadership
roles with Unisys Corporation
• Started his career with IBM
• B.S. and MBA degrees from California State
University, Fresno
© 2015 Proprietary and Confidential 3
Agenda
• Disaster Recovery Challenges
• Seven Rules of IT Disaster Recovery
• How Acronis Helps
• Q&A
Disaster Recovery Challenges
© 2015 Proprietary and Confidential 5
Not If, But When: Disasters Happen Everyday
Avoid Business Disruption and Keep Employees Productive!
Hacking
Natural Disaster
Theft of Corporate Data
Employee Malfeasance
IT Admin Mistake
Viruses
Tech Migration Failure
Hardware Failure
User Mistake
Software error
Loss of Device
Major DisasterOperational DisasterMinor Disaster
© 2015 Proprietary and Confidential 6
Customers’ Challenges
• More infrastructure complexity
• More locations of data
• More data
• More reliance on IT service
• Less resources to protect it all
• Compliance pressure
• Credibility and image
How can I protect my IT environment
– data, applications, infrastructure?
© 2015 Proprietary and Confidential 7
Challenges of DIY DR
VS.
Expensive Complex Unreliable
Can you build DR yourself? Possibly.
Should you?... Probably not.
$$$
© 2015 Proprietary and Confidential 8
Choosing the Right Architecture
Disaster Recovery as a Service with Backup
Backup Centric Solutions
Public Cloud
On-Premise Appliances
Traditional Legacy Disaster Recovery Providers
Service Provider leveraging infrastructure
Do-It-Yourself (DIY) In-House or with Colo
Seven Rules of IT Disaster
Recovery
© 2015 Proprietary and Confidential 10
Seven Rules of IT Disaster Recovery
10
#1 Plan Ahead and Document
#2 Replicate Applications
#3 Protect On-Site and Off-Site
#4 Automate!
#5 Test. Test. Test.
#6 Remember the Security
#7 Choose the Right IT DR Partner
© 2015 Proprietary and Confidential 11
1. Plan Ahead and Document
• Assume the Worst
• Overestimate risks
• Choose easier paths
• Criticize and let criticize
• Let the document evolve
© 2015 Proprietary and Confidential 12
2. Replicate Applications
• Aim to Continue Business
• Serve the needs of Users
• Applications = many servers:
– Active Directory
– SQL
– Web Front
– App Server
E-mail CRM
ERP Reporting
© 2015 Proprietary and Confidential 13
3. Protect On-Site and Off-Site
• On-site
– Single server, file recovery
• Off-site
– Site Disaster Recovery
• 3-2-1 Rule of Data Protection
copies:
1 production +
2 replicas
locations
off-site
cloud
© 2015 Proprietary and Confidential 14
4. Automate!
• Do not put the brunt of DR on
staff shoulders
• Go for Push-Button approach
• Assure success
© 2015 Proprietary and Confidential 15
5. Test. Test. Test.
• DR solution works when you
buy test it
• Remember changes
• Test regularly
• Test ad-hoc
© 2015 Proprietary and Confidential 16
6. Remember the Security
• Secure Data Centers
• Certifications
• Encryption
• Track record
• Compliance
© 2015 Proprietary and Confidential 17
7. Choose the Right IT DR Partner
• Knowledge
• Track Record
• Proven technologies
• Recognized by Experts
• Recommended by Customers
How Acronis Helps
© 2015 Proprietary and Confidential 19
Acronis Disaster Recovery Service
All-in-one solution for your backup + disaster recovery needs
Push-button, automated recovery with graphical runbooks
Built-in non-disruptive scheduled testing
24x7x365 white glove support
All-in-one, backup and cloud disaster recovery
Easy
Safe
Complete
RTO of 15 minutes or less per server
#1 Planning
© 2015 Proprietary and Confidential 20
Proven Market Leader
(Acronis) received maximum
scores in:
• Security
• Change Management
• Growth
• Partnerships
Forrester Research named (Acronis) a Leader in
Disaster-Recovery-As-A-Service Providers, Q1 2014.
#6 Security
© 2015 Proprietary and Confidential 21
Proven Market Leader
Gartner placed Acronis as a top challenger in its DRaaS Magic
Quadrant, April 2015.
Report emphasized on Acronis’s:
• High customer satisfaction
• Support and SLA performance
• Strong experience in hybrid cloud
• Fully-automated runbooks
• Non-disruptive testing
#5 Test
Download The Report
© 2015 Proprietary and Confidential 22
Complete solution
Peace of mind
Broad use cases
• Backup + Disaster Recovery
• Protect files, folders, servers,
or entire data centers
• On- and off-site protection
#2 Replicate
Applications
What You Get With Acronis
© 2015 Proprietary and Confidential 23
Complete solution
Peace of mind
Broad use cases
• Proven market-leading solutions
• SLA guarantees
• Push-button automation
• Built-in testing guarantees it will
work!
• Access anywhere administration
• 24x7 white-glove support
#4 Automate
What You Get With Acronis
© 2015 Proprietary and Confidential 24
Complete solutions
Peace of mind
Broad use cases
• Flexible RTO: 15 minutes or less
• Cloud, local, or hybrid
• Windows and Linux
• PCs and servers
• Physical and virtual
• Hypervisors – VMware, HyperV, Zen, KVM
• Any storage, including NetApp
#3 On-site
and Off-site
What You Get With Acronis
© 2015 Proprietary and Confidential 25
Acronis Industry Proven Leader
Market Leading Solutions & Technology
• Disaster Recovery
• Full Image Backup
• Endpoint Backup
• System Deployment
• Mobile Content Management
• Enterprise File Syncing and Sharing
Market Leadership
3,000,000+ new licenses in 2014
300,000 business customers
100,000+ corporate free trial downloads/year
Acronis Disaster Recovery Data Centers
#7 Choose the
right IT DR
Partner
© 2015 Proprietary and Confidential 26
Q & A
Go to or contact us at
DR@Acronis.com to
• Learn more
• Get more information
• Start protecting your business with
Acronis Disaster Recovery Service!
www.acronis.com
www.acronis.com
twitter.com/acronis
blog.acronis.com
facebook.com/acronis
New Generation Data Protection
Powered by the Acronis AnyData Engine
Replay the Webinar
https://attendee.gotowebinar.com/regist
er/544276215449416194

Weitere ähnliche Inhalte

Was ist angesagt?

introduction to Azure Sentinel
introduction to Azure Sentinelintroduction to Azure Sentinel
introduction to Azure SentinelRobert Crane
 
Enterprise DevOps is not an oxymoron
Enterprise DevOps is not an oxymoronEnterprise DevOps is not an oxymoron
Enterprise DevOps is not an oxymoronLee Eason
 
Secure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOpsSecure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOpsCloudPassage
 
Seclore for McAfee MVISION Cloud
Seclore for McAfee MVISION CloudSeclore for McAfee MVISION Cloud
Seclore for McAfee MVISION CloudSeclore
 
Elastic SIEM (Endpoint Security)
Elastic SIEM (Endpoint Security)Elastic SIEM (Endpoint Security)
Elastic SIEM (Endpoint Security)Kangaroot
 
Elastic Security: Proteção Empresarial construída sobre o Elastic Stack
Elastic Security: Proteção Empresarial construída sobre o Elastic StackElastic Security: Proteção Empresarial construída sobre o Elastic Stack
Elastic Security: Proteção Empresarial construída sobre o Elastic StackElasticsearch
 
Cloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls SecurityCloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls SecurityHari Kumar
 
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...DevOps.com
 
Dedicated Servers Cheap
Dedicated Servers CheapDedicated Servers Cheap
Dedicated Servers CheapMedha Hosting
 
Complete Data Protection for Your Business - Datacomm Seminar
Complete Data Protection for Your Business - Datacomm SeminarComplete Data Protection for Your Business - Datacomm Seminar
Complete Data Protection for Your Business - Datacomm SeminarPT Datacomm Diangraha
 
Cloud Security - Kloudlearn
Cloud Security - KloudlearnCloud Security - Kloudlearn
Cloud Security - KloudlearnKloudLearn
 
Elastic Security: Enterprise Protection Built on the Elastic Stack
Elastic Security: Enterprise Protection Built on the Elastic StackElastic Security: Enterprise Protection Built on the Elastic Stack
Elastic Security: Enterprise Protection Built on the Elastic StackElasticsearch
 
Keynote: Elastic Security evolution and vision
Keynote: Elastic Security evolution and visionKeynote: Elastic Security evolution and vision
Keynote: Elastic Security evolution and visionElasticsearch
 
Guide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public CloudGuide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public CloudInsight
 
The Top Cloud Security Issues
The Top Cloud Security IssuesThe Top Cloud Security Issues
The Top Cloud Security IssuesHTS Hosting
 
Kaspersky Endpoint Overview
Kaspersky Endpoint OverviewKaspersky Endpoint Overview
Kaspersky Endpoint Overviewsferinga
 
Security From The Ground Up
Security From The Ground UpSecurity From The Ground Up
Security From The Ground Upbuggeen
 
Csa UK agm 2019 - Craig Savage - safe as clouds the journey from legacy to cl...
Csa UK agm 2019 - Craig Savage - safe as clouds the journey from legacy to cl...Csa UK agm 2019 - Craig Savage - safe as clouds the journey from legacy to cl...
Csa UK agm 2019 - Craig Savage - safe as clouds the journey from legacy to cl...Cloud Security Alliance, UK chapter
 

Was ist angesagt? (19)

introduction to Azure Sentinel
introduction to Azure Sentinelintroduction to Azure Sentinel
introduction to Azure Sentinel
 
Enterprise DevOps is not an oxymoron
Enterprise DevOps is not an oxymoronEnterprise DevOps is not an oxymoron
Enterprise DevOps is not an oxymoron
 
Secure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOpsSecure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOps
 
Seclore for McAfee MVISION Cloud
Seclore for McAfee MVISION CloudSeclore for McAfee MVISION Cloud
Seclore for McAfee MVISION Cloud
 
Elastic SIEM (Endpoint Security)
Elastic SIEM (Endpoint Security)Elastic SIEM (Endpoint Security)
Elastic SIEM (Endpoint Security)
 
Elastic Security: Proteção Empresarial construída sobre o Elastic Stack
Elastic Security: Proteção Empresarial construída sobre o Elastic StackElastic Security: Proteção Empresarial construída sobre o Elastic Stack
Elastic Security: Proteção Empresarial construída sobre o Elastic Stack
 
Cloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls SecurityCloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls Security
 
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
 
Dedicated Servers Cheap
Dedicated Servers CheapDedicated Servers Cheap
Dedicated Servers Cheap
 
Complete Data Protection for Your Business - Datacomm Seminar
Complete Data Protection for Your Business - Datacomm SeminarComplete Data Protection for Your Business - Datacomm Seminar
Complete Data Protection for Your Business - Datacomm Seminar
 
Cloud Security - Kloudlearn
Cloud Security - KloudlearnCloud Security - Kloudlearn
Cloud Security - Kloudlearn
 
Elastic Security: Enterprise Protection Built on the Elastic Stack
Elastic Security: Enterprise Protection Built on the Elastic StackElastic Security: Enterprise Protection Built on the Elastic Stack
Elastic Security: Enterprise Protection Built on the Elastic Stack
 
Cloud security risks
Cloud security risksCloud security risks
Cloud security risks
 
Keynote: Elastic Security evolution and vision
Keynote: Elastic Security evolution and visionKeynote: Elastic Security evolution and vision
Keynote: Elastic Security evolution and vision
 
Guide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public CloudGuide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public Cloud
 
The Top Cloud Security Issues
The Top Cloud Security IssuesThe Top Cloud Security Issues
The Top Cloud Security Issues
 
Kaspersky Endpoint Overview
Kaspersky Endpoint OverviewKaspersky Endpoint Overview
Kaspersky Endpoint Overview
 
Security From The Ground Up
Security From The Ground UpSecurity From The Ground Up
Security From The Ground Up
 
Csa UK agm 2019 - Craig Savage - safe as clouds the journey from legacy to cl...
Csa UK agm 2019 - Craig Savage - safe as clouds the journey from legacy to cl...Csa UK agm 2019 - Craig Savage - safe as clouds the journey from legacy to cl...
Csa UK agm 2019 - Craig Savage - safe as clouds the journey from legacy to cl...
 

Andere mochten auch

Backup recoveryadvancedserver installationguide.pt
Backup recoveryadvancedserver installationguide.ptBackup recoveryadvancedserver installationguide.pt
Backup recoveryadvancedserver installationguide.ptLuciano Mendes
 
Introducing Acronis Backup as a Service
Introducing Acronis Backup as a ServiceIntroducing Acronis Backup as a Service
Introducing Acronis Backup as a ServiceIngram Micro Cloud
 
The Rise of the Mobile Web
The Rise of the Mobile WebThe Rise of the Mobile Web
The Rise of the Mobile WebZSL Mobile
 
Msp deck v1.0
Msp deck v1.0Msp deck v1.0
Msp deck v1.0AccelOps
 
Call Management Services Should be Part of Every Business Telephone System
Call Management Services Should be Part of Every Business Telephone SystemCall Management Services Should be Part of Every Business Telephone System
Call Management Services Should be Part of Every Business Telephone SystemMahindra Comviva
 
Zaptech Solutions - Software Development Company
Zaptech Solutions - Software Development CompanyZaptech Solutions - Software Development Company
Zaptech Solutions - Software Development CompanyZaptech Solutions
 
Data on demand flexible archiving in a big content world
Data on demand   flexible archiving in a big content worldData on demand   flexible archiving in a big content world
Data on demand flexible archiving in a big content worldActuate Corporation
 
Driving Business Applications with Real-Time Data
Driving Business Applications with Real-Time DataDriving Business Applications with Real-Time Data
Driving Business Applications with Real-Time DataBP Logix
 
Compliance Guide for NFA-Registered Firms
Compliance Guide for NFA-Registered FirmsCompliance Guide for NFA-Registered Firms
Compliance Guide for NFA-Registered FirmsActiance, Inc.
 
Security event presentation 3.4.2016-final
Security event presentation 3.4.2016-finalSecurity event presentation 3.4.2016-final
Security event presentation 3.4.2016-finalCal Net Technology Group
 
Linking Open Government Data at Scale
Linking Open Government Data at Scale Linking Open Government Data at Scale
Linking Open Government Data at Scale Bernadette Hyland-Wood
 
Embracing Mobile First
Embracing Mobile FirstEmbracing Mobile First
Embracing Mobile FirstCoreMedia
 
KPN Getronics Portfolio informatie
KPN Getronics Portfolio informatieKPN Getronics Portfolio informatie
KPN Getronics Portfolio informatieKPN Getronics
 

Andere mochten auch (20)

Acronis
AcronisAcronis
Acronis
 
Backup recoveryadvancedserver installationguide.pt
Backup recoveryadvancedserver installationguide.ptBackup recoveryadvancedserver installationguide.pt
Backup recoveryadvancedserver installationguide.pt
 
Acronis presentation
Acronis presentationAcronis presentation
Acronis presentation
 
Introducing Acronis Backup as a Service
Introducing Acronis Backup as a ServiceIntroducing Acronis Backup as a Service
Introducing Acronis Backup as a Service
 
The Rise of the Mobile Web
The Rise of the Mobile WebThe Rise of the Mobile Web
The Rise of the Mobile Web
 
VideoPress
VideoPressVideoPress
VideoPress
 
Msp deck v1.0
Msp deck v1.0Msp deck v1.0
Msp deck v1.0
 
Call Management Services Should be Part of Every Business Telephone System
Call Management Services Should be Part of Every Business Telephone SystemCall Management Services Should be Part of Every Business Telephone System
Call Management Services Should be Part of Every Business Telephone System
 
Zaptech Solutions - Software Development Company
Zaptech Solutions - Software Development CompanyZaptech Solutions - Software Development Company
Zaptech Solutions - Software Development Company
 
Daily sheet
Daily sheetDaily sheet
Daily sheet
 
Data on demand flexible archiving in a big content world
Data on demand   flexible archiving in a big content worldData on demand   flexible archiving in a big content world
Data on demand flexible archiving in a big content world
 
Microsoft Office for the iPhone and iPad
Microsoft Office for the iPhone and iPadMicrosoft Office for the iPhone and iPad
Microsoft Office for the iPhone and iPad
 
Ws wp-365 days of hr
Ws wp-365 days of hrWs wp-365 days of hr
Ws wp-365 days of hr
 
Driving Business Applications with Real-Time Data
Driving Business Applications with Real-Time DataDriving Business Applications with Real-Time Data
Driving Business Applications with Real-Time Data
 
Compliance Guide for NFA-Registered Firms
Compliance Guide for NFA-Registered FirmsCompliance Guide for NFA-Registered Firms
Compliance Guide for NFA-Registered Firms
 
Security event presentation 3.4.2016-final
Security event presentation 3.4.2016-finalSecurity event presentation 3.4.2016-final
Security event presentation 3.4.2016-final
 
KServe Retail Outlet
KServe Retail OutletKServe Retail Outlet
KServe Retail Outlet
 
Linking Open Government Data at Scale
Linking Open Government Data at Scale Linking Open Government Data at Scale
Linking Open Government Data at Scale
 
Embracing Mobile First
Embracing Mobile FirstEmbracing Mobile First
Embracing Mobile First
 
KPN Getronics Portfolio informatie
KPN Getronics Portfolio informatieKPN Getronics Portfolio informatie
KPN Getronics Portfolio informatie
 

Ähnlich wie The 7 Rules of IT Disaster Recovery by Acronis

Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...
Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...
Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...Storage Switzerland
 
Breaking the Disaster Recovery Mold
Breaking the Disaster Recovery MoldBreaking the Disaster Recovery Mold
Breaking the Disaster Recovery MoldInnoTech
 
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...Veritas Technologies LLC
 
Webinar NETGEAR - Acronis e Netgear una panoramicadelle soluzioni per la prot...
Webinar NETGEAR - Acronis e Netgear una panoramicadelle soluzioni per la prot...Webinar NETGEAR - Acronis e Netgear una panoramicadelle soluzioni per la prot...
Webinar NETGEAR - Acronis e Netgear una panoramicadelle soluzioni per la prot...Netgear Italia
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingCipherCloud
 
Professional Services for Cyber Recovery .pptx
Professional Services for Cyber Recovery .pptxProfessional Services for Cyber Recovery .pptx
Professional Services for Cyber Recovery .pptxssusercc05cf
 
Webinar: 10 Reasons Why Backup Breaks and How to Fix It
Webinar: 10 Reasons Why Backup Breaks and How to Fix ItWebinar: 10 Reasons Why Backup Breaks and How to Fix It
Webinar: 10 Reasons Why Backup Breaks and How to Fix ItStorage Switzerland
 
Webinar: IT Disaster Recovery - Simplifying IT Resilience With the Help of th...
Webinar: IT Disaster Recovery - Simplifying IT Resilience With the Help of th...Webinar: IT Disaster Recovery - Simplifying IT Resilience With the Help of th...
Webinar: IT Disaster Recovery - Simplifying IT Resilience With the Help of th...iland Cloud
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Securitycentralohioissa
 
(DVO208) Mission-Critical Business Applications in the Cloud
(DVO208) Mission-Critical Business Applications in the Cloud(DVO208) Mission-Critical Business Applications in the Cloud
(DVO208) Mission-Critical Business Applications in the CloudAmazon Web Services
 
Webinar: Using the Cloud to Fix Backup's Blind Spot - Endpoint Data Protection
Webinar: Using the Cloud to Fix Backup's Blind Spot - Endpoint Data ProtectionWebinar: Using the Cloud to Fix Backup's Blind Spot - Endpoint Data Protection
Webinar: Using the Cloud to Fix Backup's Blind Spot - Endpoint Data ProtectionStorage Switzerland
 
Acronis+IW_Webinar_10Nov2015
Acronis+IW_Webinar_10Nov2015Acronis+IW_Webinar_10Nov2015
Acronis+IW_Webinar_10Nov2015Amer Zia
 
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...Dell World
 
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...CloudSmartz
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterVMUG IT
 
The 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: ExposedThe 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: ExposedCloudera, Inc.
 
Webinar: What's Wrong with DRaaS and How to Fix it
Webinar: What's Wrong with DRaaS and How to Fix itWebinar: What's Wrong with DRaaS and How to Fix it
Webinar: What's Wrong with DRaaS and How to Fix itStorage Switzerland
 
Raising Your Game: Maximizing Uptime in the Multi-cloud
Raising Your Game: Maximizing Uptime in the Multi-cloudRaising Your Game: Maximizing Uptime in the Multi-cloud
Raising Your Game: Maximizing Uptime in the Multi-cloudVeritas Technologies LLC
 
Webinar: Preparing for Disasters that Will Actually Happen
Webinar: Preparing for Disasters that Will Actually HappenWebinar: Preparing for Disasters that Will Actually Happen
Webinar: Preparing for Disasters that Will Actually HappenStorage Switzerland
 
Database Security, Better Audits, Lower Costs
Database Security, Better Audits, Lower CostsDatabase Security, Better Audits, Lower Costs
Database Security, Better Audits, Lower CostsImperva
 

Ähnlich wie The 7 Rules of IT Disaster Recovery by Acronis (20)

Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...
Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...
Webinar: Veteran vs. Rookie – Who is Best Able to Meet The Enterprise Backup ...
 
Breaking the Disaster Recovery Mold
Breaking the Disaster Recovery MoldBreaking the Disaster Recovery Mold
Breaking the Disaster Recovery Mold
 
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
 
Webinar NETGEAR - Acronis e Netgear una panoramicadelle soluzioni per la prot...
Webinar NETGEAR - Acronis e Netgear una panoramicadelle soluzioni per la prot...Webinar NETGEAR - Acronis e Netgear una panoramicadelle soluzioni per la prot...
Webinar NETGEAR - Acronis e Netgear una panoramicadelle soluzioni per la prot...
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File Sharing
 
Professional Services for Cyber Recovery .pptx
Professional Services for Cyber Recovery .pptxProfessional Services for Cyber Recovery .pptx
Professional Services for Cyber Recovery .pptx
 
Webinar: 10 Reasons Why Backup Breaks and How to Fix It
Webinar: 10 Reasons Why Backup Breaks and How to Fix ItWebinar: 10 Reasons Why Backup Breaks and How to Fix It
Webinar: 10 Reasons Why Backup Breaks and How to Fix It
 
Webinar: IT Disaster Recovery - Simplifying IT Resilience With the Help of th...
Webinar: IT Disaster Recovery - Simplifying IT Resilience With the Help of th...Webinar: IT Disaster Recovery - Simplifying IT Resilience With the Help of th...
Webinar: IT Disaster Recovery - Simplifying IT Resilience With the Help of th...
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Security
 
(DVO208) Mission-Critical Business Applications in the Cloud
(DVO208) Mission-Critical Business Applications in the Cloud(DVO208) Mission-Critical Business Applications in the Cloud
(DVO208) Mission-Critical Business Applications in the Cloud
 
Webinar: Using the Cloud to Fix Backup's Blind Spot - Endpoint Data Protection
Webinar: Using the Cloud to Fix Backup's Blind Spot - Endpoint Data ProtectionWebinar: Using the Cloud to Fix Backup's Blind Spot - Endpoint Data Protection
Webinar: Using the Cloud to Fix Backup's Blind Spot - Endpoint Data Protection
 
Acronis+IW_Webinar_10Nov2015
Acronis+IW_Webinar_10Nov2015Acronis+IW_Webinar_10Nov2015
Acronis+IW_Webinar_10Nov2015
 
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
 
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
 
The 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: ExposedThe 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: Exposed
 
Webinar: What's Wrong with DRaaS and How to Fix it
Webinar: What's Wrong with DRaaS and How to Fix itWebinar: What's Wrong with DRaaS and How to Fix it
Webinar: What's Wrong with DRaaS and How to Fix it
 
Raising Your Game: Maximizing Uptime in the Multi-cloud
Raising Your Game: Maximizing Uptime in the Multi-cloudRaising Your Game: Maximizing Uptime in the Multi-cloud
Raising Your Game: Maximizing Uptime in the Multi-cloud
 
Webinar: Preparing for Disasters that Will Actually Happen
Webinar: Preparing for Disasters that Will Actually HappenWebinar: Preparing for Disasters that Will Actually Happen
Webinar: Preparing for Disasters that Will Actually Happen
 
Database Security, Better Audits, Lower Costs
Database Security, Better Audits, Lower CostsDatabase Security, Better Audits, Lower Costs
Database Security, Better Audits, Lower Costs
 

Kürzlich hochgeladen

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Kürzlich hochgeladen (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

The 7 Rules of IT Disaster Recovery by Acronis

  • 1. New Generation Data Protection Powered by the Acronis AnyData Engine Seven Rules of IT Disaster Recovery Acronis Webinar
  • 2. © 2015 Proprietary and Confidential 2 Mark Jameson, GM, Global DR • Joined Acronis with the acquisition of nScaled in September 2014 • Over 30 years of experience in the disaster recovery and information technology markets • Most recently, the Vice President of Global DRaaS Sales and Marketing at nScaled • Prior, Vice President of Sales at SunGard Availability Services • Earl career, held various sales and sales leadership roles with Unisys Corporation • Started his career with IBM • B.S. and MBA degrees from California State University, Fresno
  • 3. © 2015 Proprietary and Confidential 3 Agenda • Disaster Recovery Challenges • Seven Rules of IT Disaster Recovery • How Acronis Helps • Q&A
  • 5. © 2015 Proprietary and Confidential 5 Not If, But When: Disasters Happen Everyday Avoid Business Disruption and Keep Employees Productive! Hacking Natural Disaster Theft of Corporate Data Employee Malfeasance IT Admin Mistake Viruses Tech Migration Failure Hardware Failure User Mistake Software error Loss of Device Major DisasterOperational DisasterMinor Disaster
  • 6. © 2015 Proprietary and Confidential 6 Customers’ Challenges • More infrastructure complexity • More locations of data • More data • More reliance on IT service • Less resources to protect it all • Compliance pressure • Credibility and image How can I protect my IT environment – data, applications, infrastructure?
  • 7. © 2015 Proprietary and Confidential 7 Challenges of DIY DR VS. Expensive Complex Unreliable Can you build DR yourself? Possibly. Should you?... Probably not. $$$
  • 8. © 2015 Proprietary and Confidential 8 Choosing the Right Architecture Disaster Recovery as a Service with Backup Backup Centric Solutions Public Cloud On-Premise Appliances Traditional Legacy Disaster Recovery Providers Service Provider leveraging infrastructure Do-It-Yourself (DIY) In-House or with Colo
  • 9. Seven Rules of IT Disaster Recovery
  • 10. © 2015 Proprietary and Confidential 10 Seven Rules of IT Disaster Recovery 10 #1 Plan Ahead and Document #2 Replicate Applications #3 Protect On-Site and Off-Site #4 Automate! #5 Test. Test. Test. #6 Remember the Security #7 Choose the Right IT DR Partner
  • 11. © 2015 Proprietary and Confidential 11 1. Plan Ahead and Document • Assume the Worst • Overestimate risks • Choose easier paths • Criticize and let criticize • Let the document evolve
  • 12. © 2015 Proprietary and Confidential 12 2. Replicate Applications • Aim to Continue Business • Serve the needs of Users • Applications = many servers: – Active Directory – SQL – Web Front – App Server E-mail CRM ERP Reporting
  • 13. © 2015 Proprietary and Confidential 13 3. Protect On-Site and Off-Site • On-site – Single server, file recovery • Off-site – Site Disaster Recovery • 3-2-1 Rule of Data Protection copies: 1 production + 2 replicas locations off-site cloud
  • 14. © 2015 Proprietary and Confidential 14 4. Automate! • Do not put the brunt of DR on staff shoulders • Go for Push-Button approach • Assure success
  • 15. © 2015 Proprietary and Confidential 15 5. Test. Test. Test. • DR solution works when you buy test it • Remember changes • Test regularly • Test ad-hoc
  • 16. © 2015 Proprietary and Confidential 16 6. Remember the Security • Secure Data Centers • Certifications • Encryption • Track record • Compliance
  • 17. © 2015 Proprietary and Confidential 17 7. Choose the Right IT DR Partner • Knowledge • Track Record • Proven technologies • Recognized by Experts • Recommended by Customers
  • 19. © 2015 Proprietary and Confidential 19 Acronis Disaster Recovery Service All-in-one solution for your backup + disaster recovery needs Push-button, automated recovery with graphical runbooks Built-in non-disruptive scheduled testing 24x7x365 white glove support All-in-one, backup and cloud disaster recovery Easy Safe Complete RTO of 15 minutes or less per server #1 Planning
  • 20. © 2015 Proprietary and Confidential 20 Proven Market Leader (Acronis) received maximum scores in: • Security • Change Management • Growth • Partnerships Forrester Research named (Acronis) a Leader in Disaster-Recovery-As-A-Service Providers, Q1 2014. #6 Security
  • 21. © 2015 Proprietary and Confidential 21 Proven Market Leader Gartner placed Acronis as a top challenger in its DRaaS Magic Quadrant, April 2015. Report emphasized on Acronis’s: • High customer satisfaction • Support and SLA performance • Strong experience in hybrid cloud • Fully-automated runbooks • Non-disruptive testing #5 Test Download The Report
  • 22. © 2015 Proprietary and Confidential 22 Complete solution Peace of mind Broad use cases • Backup + Disaster Recovery • Protect files, folders, servers, or entire data centers • On- and off-site protection #2 Replicate Applications What You Get With Acronis
  • 23. © 2015 Proprietary and Confidential 23 Complete solution Peace of mind Broad use cases • Proven market-leading solutions • SLA guarantees • Push-button automation • Built-in testing guarantees it will work! • Access anywhere administration • 24x7 white-glove support #4 Automate What You Get With Acronis
  • 24. © 2015 Proprietary and Confidential 24 Complete solutions Peace of mind Broad use cases • Flexible RTO: 15 minutes or less • Cloud, local, or hybrid • Windows and Linux • PCs and servers • Physical and virtual • Hypervisors – VMware, HyperV, Zen, KVM • Any storage, including NetApp #3 On-site and Off-site What You Get With Acronis
  • 25. © 2015 Proprietary and Confidential 25 Acronis Industry Proven Leader Market Leading Solutions & Technology • Disaster Recovery • Full Image Backup • Endpoint Backup • System Deployment • Mobile Content Management • Enterprise File Syncing and Sharing Market Leadership 3,000,000+ new licenses in 2014 300,000 business customers 100,000+ corporate free trial downloads/year Acronis Disaster Recovery Data Centers #7 Choose the right IT DR Partner
  • 26. © 2015 Proprietary and Confidential 26 Q & A Go to or contact us at DR@Acronis.com to • Learn more • Get more information • Start protecting your business with Acronis Disaster Recovery Service! www.acronis.com
  • 27. www.acronis.com twitter.com/acronis blog.acronis.com facebook.com/acronis New Generation Data Protection Powered by the Acronis AnyData Engine Replay the Webinar https://attendee.gotowebinar.com/regist er/544276215449416194