Planning a Backup Strategy

Size: px
Start display at page:

Download "Planning a Backup Strategy"

Transcription

1 Planning a Backup Strategy White Paper Backups, restores, and data recovery operations are some of the most important tasks that an IT organization performs. Businesses cannot risk losing access to data for any significant amount of time; therefore, the organization should develop and follow a detailed plan, commonly called a backup strategy. An all-encompassing, master backup strategy can be difficult to apply consistently due to differences in staffing and technologies that typically exist from one business unit to another throughout an organization. It may be valuable to develop individual strategies for various business units or user groups, depending on application usage. The process steps described in this section are iterative. Each step can be performed with variations, whenever a new customer s service level agreement (SLA) impacts backup, restore, or data recovery requirements; or if business needs change and affect the previously mentioned. Note: executing the final steps of the backup strategy described below involves the implementation and testing of the storage solution selected. For additional details about piloting, testing, and releasing new technologies into the production IT environment, see the MOF release management guide. An understanding of the following concepts is important when developing a backup strategy: What is Backup? A backup is the process of periodically moving data from one type of medium (typically hard disk) to a secondary storage medium for potential retrieval at a later date (short-term, usually within a few days to a couple of months). The secondary storage medium is most often magnetic tape, but may also include hard disk, CD-ROM, and optical disk. Write specific policies to inform users of their responsibilities regarding backups. For example, personal data is typically the responsibility of individual users to store and restore. Company data is often stored on servers that are subject to scheduled backups, thereby ensuring data restore and recovery capabilities. Write procedures that explain these policies to users along with the defined backup schedules for different classes of data. What is Archival Storage? Archival storage is sometimes referred to as data archiving, is essentially the same task as a backup, except that the intent is to store the data for long periods of time, possibly forever. Often, data must be kept for long periods of time because of legal reasons, and it is important that these reasons be known to the storage manager and taken into account when planning for storage needs. What is a Restore? A restore is the process of retrieving data (a single file or many files) from a storage medium to a target location (typically a hard disk). In most data centres, there are policies that inform users of their

2 responsibilities with regard to data restores. For example, personal data is typically the responsibility of individual end users to store and restore. Company data, on the other hand, often has to be stored on servers that are subject to scheduled backups, thereby ensuring data restore and recovery capabilities, should the need arise. What is a data Recovery? Data recovery is the process of completely restoring data to the state it was in at some prior point in time. Data recovery is usually performed as a result of some kind of disaster that has caused serious data loss, corruption, or both. Although we often think of disasters as being either natural (as in the case of an earthquake) or man-made (as in the case of a computer virus), a disaster can be defined as any event that causes serious interruption to the running of a business. For example, a hard disk crash on a production system could cause an e-commerce system to cease operation, and for many companies, would qualify as a disaster requiring a complete data recovery. Proper planning could mitigate these circumstances Classify Data One of the first steps that operations must execute prior to developing a good backup strategy is to classify the various types of data in the IT environment. For example, most organizations do not back up user data, defined as personal data not related to the business. So, user data would be a type of data classification that could be ruled out of scope for scheduled backups and therefore falls to the responsibility of individual users to store. Company business data, on the other hand, could be a classification of data that is important to the company and is scheduled for regular backups. Within the company business data classification, there could be varying levels of company data, such as company private, while other data types could be company resource data, project data, and so on. A good rule is to classify data according to its business impact. For example, there is some data that the company must have available or the business cannot run like a parts list for a manufacturing company. This type of data has a high business impact and should be classified accordingly. Sometimes there is data that does not have to be online all the time, but must be available when needed for example, the testing data generated by medical companies performing drug research. This too could be classified as high business impact, because the company would be at risk if a product was flawed, and the company could not produce testing data for the last several years. Define Backup Requirements When the different data types have been classified, the requirements and specifications for each data type can be defined. Note: Many of the specific requirements discussed here for determining a productive backup strategy should be provided to IT as the result of SLA development and not demand much time or effort for IT staff to discover. The service level manager and the customer liaison work with customer management to ensure the customer s business requirements are satisfactorily addressed through the delivery of IT services. These requirements should include backup, restore, and recovery business needs, which are then negotiated and eventually committed to by IT. Each of these requirements is discussed in this section to ensure that nothing is missed during backup strategy development. Determine how much data to store Determine, for each of the different data types, how much data needs to be stored. Whether you are dealing with terabytes of data or megabytes of data will influence the strategy. Understanding this will help to determine the types of devices required for doing the backup, the required media, whether there is sufficient time for the backup or if an online storage method must be considered, and so on.

3 Determine where the Data is located Now that the types of data in the environment and the storage needs of each data type are known, one must determine where the data is located. This information is critical in determining the technologies needed to implement the backup strategy. For example, in a geographically distributed environment, with servers located across the country or the planet a centralized backup solution could result in flooding the networks with backup data. This could have a potentially serious impact on business productivity. In such a case, a localized backup solution may need to be considered, perhaps in an automated mode to reduce cost. Many companies are finding that a lot of valuable company business data is located on mobile personal computers. This can be a difficult situation for IT because attempts to back up desktop computers en masse are usually cost prohibitive. When more and more of these client personal computers are mobile laptop computers, the situation grows more complex. A recommended best practice is to direct all personal computer users to store company business data on targeted servers, which are backed up regularly. Note: Fortunately, technologies are becoming increasingly available that allow users data and settings to follow them whenever they move from location to location, thereby increasing productivity. Taking advantage of such capabilities should be a high priority for more IT organizations. Determine Projected Data Growth Another critical piece of information needed to develop a backup strategy is estimating the projected growth of data by type. IT should make sure that the backup strategy developed is not quickly outdated. Future plans about the projected number of users and what type of data they create should be considered. If the company is planning to hire 100 new employees, the amount of user and business data will grow accordingly. Prepare for the future and build in the required capacity. Determine Backup and Restore Performance Requirements Information Technology (IT) Operations needs to determine the performance requirements for backups, restores and recovery. These requirements should align with business needs. During the course of developing SLAs, specific service level objectives (metrics) regarding backup, restore and recovery performance are defined, negotiated, and agreed to between the different business units and IT. Note that these service level objectives must be monitored for compliance with SLAs to ensure that both IT and customer commitments are being met. Determine the Database Backup and Restore Needs A company s most pertinent, critical data resides in databases. Each database is different; be certain to take advantage of the tools offered by database vendors for backing up, restoring, and recovering data contained in their different databases. Most of the major database vendors provide the ability to back up their databases online, without shutting the database down. They typically provide tools that can generate lists of files that need to be backed up and ensure that control files, archive logs, redo logs, and table spaces are backed up appropriately. Some tools even provide event-driven archival capabilities that automatically execute archiving data when a volume exceeds a predetermined capacity. Determine Time Tables for Backups and Restores Determine how often the data needs to be backed up per data type. For example, users working files may be backed up on a daily basis, system data on a weekly basis, and critical database transactions twice a day.

4 Determine the allowable timeframe for performing a backup. For instance, user files can be backed up any time users are not working on them, while some transactional databases may only have a few hours available for backup. Evaluate the amount of data needing backup, the existing infrastructure, and the technologies to use to estimate the time required for each backup. In the case of offline backups, all these factors can affect users access to data. For this reason, calculations for backup time requirements should be compared to specific business requirements. If the business demands that users have access to data 22 hours per day, a four-hour offline backup will not work; another solution would need to be found (for example, online backup, SAN, and so on). The allowable timeframe for data recovery on a per data type basis must be known. For example, it might be perfectly acceptable to take two days to restore some user files, while company business data might have to be recovered in two hours. When determining allowable recovery time, remember that this includes a combination of the time needed to access the storage media plus the time required to actually restore the data to disk. The clearest example of this is when a full system recovery is required and media must be obtained from offsite storage. This information is used to determine the specific backup schedules enforced by operations. Determine Data Archiving (Offsite Storage) Requirements When developing the requirements for different data types, also plan for each type how the storage media, should be secured and maintained. For instance, high business impact data should backed up regularly, and periodically stored offsite. User data, if backed up at all, will not require offsite storage. Security restrictions for data both onsite and offsite will also have to be gauged. Again, the data classification can help determine the security needs. Also determine the length of storage time per data type. For example, user files may need to be kept for only three weeks, while information about company employees may be need to be kept for five years. Consider the following types of data and information when planning for offsite storage: A full backup of the entire system, done weekly Contents of the Definitive Software Library Documents required to support an insurance claim, such as hardware and software inventory records, and copies of purchase orders or receipts for computer hardware and software A copy of information required to reinstall and reconfigure network hardware Identify the Constraints As with any strategy development effort, be careful that the backup plan does not conflict with any existing, or proposed, standards or policies. Security policies may exist that dictate restrictions for data access (for example, who can request restoration of certain files), offsite storage (for example, which data must be securely stored in a vault), and so on. The backup strategy should comply with these policies. SLAs should contain specific service level objectives for different IT customers (for example, user groups) that detail things like allowable time to restore, onsite versus offsite storage, backup schedules, and so on. The backup strategy should enable these service level objectives to be achieved. If a conflict arises, the storage manager and the service level manager determine a solution or renegotiate the service level objectives. The specific infrastructure may also provide certain constraints on the backup strategy. Available network bandwidth, storage devices installed, cost, and other factors can limit the final strategy. Define the Backup and Restore Policies With all of the information gathered in the previous steps, the backup policies can now be defined and documented. Do not publish any policies that cannot be enforced. Implement the appropriate monitoring and measurements to ensure compliance. It is imperative that specific policies regarding data backups and restores be written, made available to all necessary personnel, and strictly enforced. These policies should reflect any commitments made by IT to other IT entities via Operating Level Agreements (OLAs) or to clients via Service Level Agreements (SLAs).

5 As a guideline, storage policies should be developed with the following considerations: Relating the data classification scheme to backup schedules. For example, company business data can be backed up once a day, database transaction data can be backed up twice a day, and so on. Pertinent constraints. For example, all requests to restore files can be submitted through a request for change (RFC). How long data will be backed up. For example, the data for Application X can be stored for one year. How backups are scheduled. For example, to avoid network overload, the data for Business Unit A is not backed up at the same time as the data for Business Unit B. Storage resource management (SRM). For example, storage events can be reported nightly and kept for one week. Security considerations. For example, all company proprietary data can be encrypted. Maintenance considerations. For example, storage media can be tested. Disaster recovery considerations. For example, in the event of hard disk failure, all data stored up to the end of the previous business day must be recoverable. For another example, in the event of a disaster as defined by the contingency plan all data must be recoverable to the end of the previous business week. Note that this policy implies that offsite secure storage exists and is being used. Analyze the Backup and Restore Requirements Review all of the requirement information gathered and the constraints and policies identified, reduce any redundancies, and document the results. This document is used as a basis for executing the next step in the process. Storage management efficiency can be increased for environments that need to manage storage devices in a distributed environment. Consolidating storage servers in a central location can achieve this objective. Storage management administration, monitoring storage resources, and overall network performance can be improved by this approach. The overall efficiency of a storage management solution can be improved by such a consolidation. About Global Micro Leading organizations reduce costs by leveraging our investment in infrastructure with efficient, cost-effective and transformational solutions from Global Micro. Customers consistently redirect savings derived from our approach to projects of higher strategic and personal value. Tel: Fax: info@globalmicro.co.za

What You Need to Know About Cloud Backup: Your Guide to Cost, Security, and Flexibility

What You Need to Know About Cloud Backup: Your Guide to Cost, Security, and Flexibility Your Guide to Cost, Security, and Flexibility What You Need to Know About Cloud Backup: Your Guide to Cost, Security, and Flexibility 10 common questions answered Over the last decade, cloud backup, recovery

More information

SVA Backup Plus Features

SVA Backup Plus Features 1221 John Q. Hammons Drive Madison, WI 53717 P.O. Box 44966, Madison, WI 53717 P: 608.826.2400 TF: 800.366.9091 F: 608.831.4243 www.sva.com Introduction Computers are the default storage medium for most

More information

Total Cost of Ownership Analysis

Total Cost of Ownership Analysis Total Cost of Ownership Analysis Abstract A total cost of ownership (TCO) analysis can measure the cost of acquiring and operating a new technology solution against a current installation. In the late

More information

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered Over the last decade, cloud backup, recovery and restore (BURR) options have emerged

More information

White Paper. Managed IT Services as a Business Solution

White Paper. Managed IT Services as a Business Solution White Paper Managed IT Services as a Business Solution 1 TABLE OF CONTENTS 2 Introduction... 2 3 The Need for Expert IT Management... 3 4 Managed Services Explained... 4 5 Managed Services: Key Benefits...

More information

BACKUP STRATEGY AND DISASTER RECOVERY POLICY STATEMENT

BACKUP STRATEGY AND DISASTER RECOVERY POLICY STATEMENT TADCASTER GRAMMAR SCHOOL Toulston, Tadcaster, North Yorkshire. LS24 9NB BACKUP STRATEGY AND DISASTER RECOVERY POLICY STATEMENT Written by Steve South November 2003 Discussed with ICT Strategy Group January

More information

techsafe Features Technology Partners - 2955 20th Street - Vero Beach, FL 32960 - www.techpart.net - (772) 299-5178 Page 1/9 0910080-01

techsafe Features Technology Partners - 2955 20th Street - Vero Beach, FL 32960 - www.techpart.net - (772) 299-5178 Page 1/9 0910080-01 techsafe Features Page 1/9 Contents 3 Introduction 3 Ease-of-Use Simple Installation Automatic Backup Off-Site Storage Scalability File Restoration 24/7 5 Security File Compression Encryption Transmission

More information

Introduction. Ease-of-Use

Introduction. Ease-of-Use Remote Data Backup Introduction Computers are the default storage medium for most businesses and virtually all home users. Because portable media is quickly becoming an outdated and expensive method for

More information

Evolved Backup Features Computer Box 220 5th Ave South Clinton, IA 52732 www.thecomputerbox.com 563-243-0016

Evolved Backup Features Computer Box 220 5th Ave South Clinton, IA 52732 www.thecomputerbox.com 563-243-0016 Evolved Backup Features 1 Contents 3 Introduction 3 Ease-of-Use Simple Installation Automatic Backup Off-Site Storage Scalability File Restoration 24/7 6 Security File Compression Encryption Transmission

More information

Things You Need to Know About Cloud Backup

Things You Need to Know About Cloud Backup Things You Need to Know About Cloud Backup Over the last decade, cloud backup, recovery and restore (BURR) options have emerged as a secure, cost-effective and reliable method of safeguarding the increasing

More information

How To Backup Your Hard Drive With Pros 4 Technology Online Backup

How To Backup Your Hard Drive With Pros 4 Technology Online Backup Pros 4 Technology Online Backup Features Introduction Computers are the default storage medium for most businesses and virtually all home users. Because portable media is quickly becoming an outdated and

More information

eztechdirect Backup Service Features

eztechdirect Backup Service Features eztechdirect Backup Service Features Introduction Portable media is quickly becoming an outdated and expensive method for safeguarding important data, so it is essential to secure critical business assets

More information

5 Essential Benefits of Hybrid Cloud Backup

5 Essential Benefits of Hybrid Cloud Backup 5 Essential Benefits of Hybrid Cloud Backup QBR is a backup, disaster recovery (BDR), and business continuity solution targeted to the small to medium business (SMB) market. QBR solutions are designed

More information

What you need to know about cloud backup: your guide to cost, security and flexibility.

What you need to know about cloud backup: your guide to cost, security and flexibility. What you need to know about cloud backup: your guide to cost, security and flexibility. Over the last decade, cloud backup, recovery and restore (BURR) options have emerged as a secure, cost-effective

More information

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery WHITE PAPER HIPAA-Compliant Data Backup and Disaster Recovery DOCUMENT INFORMATION HIPAA-Compliant Data Backup and Disaster Recovery PRINTED March 2011 COPYRIGHT Copyright 2011 VaultLogix, LLC. All Rights

More information

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered Over the last decade, cloud backup, recovery and restore (BURR) options have emerged

More information

THE CASE FOR ACTIVE DATA ARCHIVING

THE CASE FOR ACTIVE DATA ARCHIVING THE CASE FOR ACTIVE DATA ARCHIVING Written by Ray Quattromini 3 rd September 2007 Contact details Tel: 01256 782030 / 08704 286 186 Fax: 08704 286 187 Email: sales@data-storage.co.uk Web: www.data-storage.co.uk

More information

Online Backup Solution Features

Online Backup Solution Features CCC Technologies, Inc. 700 Nicholas Blvd., Suite 300 Elk Grove Village, IL 60007 877.282.9227 www.ccctechnologies.com Online Backup Solution Features Introduction Computers are the default storage medium

More information

Introduction. Silverton Consulting, Inc. StorInt Briefing

Introduction. Silverton Consulting, Inc. StorInt Briefing Introduction Silverton Consulting, Inc. StorInt Briefing All too often in today s SMB data centers the overall backup and recovery process, including both its software and hardware components, is given

More information

DISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0

DISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0 DISASTER RECOVERY Omniture Disaster Plan June 2, 2008 Version 2.0 CHAPTER 1 1 Disaster Recovery Plan Overview In the event that one of our data collection environments are unavailable due to an event,

More information

16 Common Backup Problems & Mistakes

16 Common Backup Problems & Mistakes 16 Common Backup Problems & Mistakes 1. Tape errors, Tape Drive failures. Probably the number one backup problem is simply caused by the unreliability of tape. Tape drives have a higher failure rate than

More information

Leveraging the Cloud for Data Protection and Disaster Recovery

Leveraging the Cloud for Data Protection and Disaster Recovery WHITE PAPER: Leveraging the Cloud for Data Protection and Disaster Recovery Leveraging the Cloud for Data Protection and Disaster Recovery Bennett Klein DATA MANAGEMENT CUSTOMER SOLUTIONS MARCH 2012 Table

More information

BACKUP SECURITY GUIDELINE

BACKUP SECURITY GUIDELINE Section: Information Security Revised: December 2004 Guideline: Description: Backup Security Guidelines: are recommended processes, models, or actions to assist with implementing procedures with respect

More information

Backup and Recovery 1

Backup and Recovery 1 Backup and Recovery What is a Backup? Backup is an additional copy of data that can be used for restore and recovery purposes. The Backup copy is used when the primary copy is lost or corrupted. This Backup

More information

Online Backup Solution with Disaster Recovery

Online Backup Solution with Disaster Recovery Online Backup Solution with Disaster Recovery Backup Replacement - Online For Businesses looking for Consistent, Reliable and Offsite Backup, with Minimal Data loss, Generational Management and Disaster

More information

Have a Plan of ATTACK. Not a panic attack. 10 September 2003 IBM Internal Use Only Jarrett Potts, Tivoli Sales Enablement

Have a Plan of ATTACK. Not a panic attack. 10 September 2003 IBM Internal Use Only Jarrett Potts, Tivoli Sales Enablement IBM Software Group Have a Plan of ATTACK Not a panic attack 10 September 2003 IBM Internal Use Only Jarrett Potts, Tivoli Sales Enablement Abstract This session will show the difference between Business

More information

BACKUP ESSENTIALS FOR PROTECTING YOUR DATA AND YOUR BUSINESS. Disasters happen. Don t wait until it s too late.

BACKUP ESSENTIALS FOR PROTECTING YOUR DATA AND YOUR BUSINESS. Disasters happen. Don t wait until it s too late. BACKUP ESSENTIALS FOR PROTECTING YOUR DATA AND YOUR BUSINESS Disasters happen. Don t wait until it s too late. OVERVIEW It s inevitable. At some point, your business will experience data loss. It could

More information

Are Mailboxes Enough?

Are Mailboxes Enough? Forensically Sound Preservation and Processing of Exchange Databases Microsoft Exchange server is the communication hub for most organizations. Crucial email flows through this database continually, day

More information

Protecting Microsoft SQL Server with an Integrated Dell / CommVault Solution. Database Solutions Engineering

Protecting Microsoft SQL Server with an Integrated Dell / CommVault Solution. Database Solutions Engineering Protecting Microsoft SQL Server with an Integrated Dell / CommVault Solution Database Solutions Engineering By Subhashini Prem and Leena Kushwaha Dell Product Group March 2009 THIS WHITE PAPER IS FOR INFORMATIONAL

More information

WHAT WOULD HAPPEN TO YOUR BUSINESS IF YOU EXPERIENCED DATA LOSS?

WHAT WOULD HAPPEN TO YOUR BUSINESS IF YOU EXPERIENCED DATA LOSS? WHAT WOULD HAPPEN TO YOUR BUSINESS IF YOU EXPERIENCED DATA LOSS? www.weredown.com (281) 990-9422 WHAT WOULD HAPPEN TO YOUR BUSINESS IF YOU EXPERIENCED DATA LOSS?...80% of all businesses without an effective

More information

THE NEXT GENERATION OF DATA INSURANCE

THE NEXT GENERATION OF DATA INSURANCE THE NEXT GENERATION OF DATA INSURANCE High Indemnity and Broad Coverage Against Permanent Loss A Data Insurance Licensing Ltd. White Paper Version 2013.4.4 Data Insurance Licensing Ltd. THE NEXT GENERATION

More information

Offsite Backup with Fast Recovery

Offsite Backup with Fast Recovery SMALL BUSINESS ESSENTIAL TECHNOLOGY INTRODUCTION Offsite Backup with Fast Recovery How not to be stranded, pulling your hair out, waiting a couple of weeks for your server to be rebuilt. STOP USING TAPE

More information

The Essential Guide for Protecting Your Legal Practice From IT Downtime

The Essential Guide for Protecting Your Legal Practice From IT Downtime The Essential Guide for Protecting Your Legal Practice From IT Downtime www.axcient.com Introduction: Technology in the Legal Practice In the professional services industry, the key deliverable of a project

More information

StorageCraft Technology Corporation Leading the Way to Safer Computing 2004-2009 StorageCraft Technology Corporation. All Rights Reserved.

StorageCraft Technology Corporation Leading the Way to Safer Computing 2004-2009 StorageCraft Technology Corporation. All Rights Reserved. PRODUCT SCENARIOS Introduction Fast and reliable online backup and bare metal recovery for Windows servers ShadowProtect Server Edition creates an exact point-in-time backup of your entire server or specific

More information

This white paper describes the three reasons why backup is a strategic element of your IT plan and why it is critical to your business that you plan

This white paper describes the three reasons why backup is a strategic element of your IT plan and why it is critical to your business that you plan This white paper describes the three reasons why backup is a strategic element of your IT plan and why it is critical to your business that you plan and execute a strategy to protect 100 percent of your

More information

Cyber Security: Guidelines for Backing Up Information. A Non-Technical Guide

Cyber Security: Guidelines for Backing Up Information. A Non-Technical Guide Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Executives, Business Managers Administrative & Operations Managers This appendix is a supplement to the Cyber Security:

More information

Oregon-Montana Disaster Recovery Phase 1

Oregon-Montana Disaster Recovery Phase 1 Oregon-Montana Disaster Recovery Phase 1 Oregon Department of Administrative Services Enterprise Technology Services http://www.oregon.gov/das/ets/pages/index.aspx Category 10: Cyber Security Project Completion

More information

Computer Backup Strategies

Computer Backup Strategies Computer Backup Strategies Think how much time it would take to recreate everything on your computer...if you could. Given all the threats to your data (viruses, natural disasters, computer crashes, and

More information

TECHNOLOGY OVERVIEW INTRONIS CLOUD BACKUP & RECOVERY

TECHNOLOGY OVERVIEW INTRONIS CLOUD BACKUP & RECOVERY INTRONIS CLOUD BACKUP & RECOVERY TECHNOLOGY OVERVIEW CONTENTS Introduction 3 Ease-of-Use 3 Simple Installation 3 Automatic Backup 3 Backup Status Dashboard 4 Off-Site Storage 4 Scalability 4 File Restoration

More information

Restoration Technologies. Mike Fishman / EMC Corp.

Restoration Technologies. Mike Fishman / EMC Corp. Trends PRESENTATION in Data TITLE Protection GOES HERE and Restoration Technologies Mike Fishman / EMC Corp. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless

More information

Local Government Cyber Security:

Local Government Cyber Security: Local Government Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Elected Officials Administrative Officials Business Managers Multi-State Information Sharing and

More information

Bringing the edge to the data center a data protection strategy for small and midsize companies with remote offices. Business white paper

Bringing the edge to the data center a data protection strategy for small and midsize companies with remote offices. Business white paper Bringing the edge to the data center a data protection strategy for small and midsize companies with remote offices Business white paper Table of contents Data protection synonymous with business success...

More information

Optimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems

Optimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems Symantec Backup Exec 12.5 for Windows Small Business Server Premium and Standard Editions Comprehensive data protection and system recovery for Microsoft Windows Small Business Server Overview Symantec

More information

Why cloud backup? Top 10 reasons

Why cloud backup? Top 10 reasons Why cloud backup? Top 10 reasons HP Autonomy solutions Table of contents 3 Achieve disaster recovery with secure offsite cloud backup 4 Free yourself from manual and complex tape backup tasks 4 Get predictable

More information

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE About M 2 TD M2 TD is a wholly black Owned IT Consulting Business. M 2 TD is a provider of data center consulting and managed services. In a rapidly changing

More information

Buyer s Guide Checklist - What to Look For in Online Backup and Recovery Services

Buyer s Guide Checklist - What to Look For in Online Backup and Recovery Services Introduction We are often asked, "How do I go about selecting an online data backup and recovery service?" Our Data Mountain White Paper answers that question and this accompanying Buyer s Guide Checklist

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original

More information

Which Backup Option is Best?

Which Backup Option is Best? Which Backup Option is Best? Which Backup Option is Best? Why Protect Your Data? Data loss disasters happen more frequently than you would think, for many different reasons: Human error and accidental

More information

Energy Efficient Storage - Multi- Tier Strategies For Retaining Data

Energy Efficient Storage - Multi- Tier Strategies For Retaining Data Energy and Space Efficient Storage: Multi-tier Strategies for Protecting and Retaining Data NOTICE This White Paper may contain proprietary information protected by copyright. Information in this White

More information

Call: 08715 900800. Disaster Recovery/Business Continuity (DR/BC) Services From VirtuousIT

Call: 08715 900800. Disaster Recovery/Business Continuity (DR/BC) Services From VirtuousIT Disaster Recovery/Business Continuity (DR/BC) Services From VirtuousIT The VirtuousIT DR/BC solution is designed around RecoveryShield from Thinking SAFE. The service includes a local backup appliance

More information

1. Management Application (or Console), including Deferred Processor & Encryption Key 2. Database 3. Website

1. Management Application (or Console), including Deferred Processor & Encryption Key 2. Database 3. Website This document answers the question: What are the disaster recovery steps for Enterprise Random Password Manager (ERPM) and how can the solution be made highly available? Disaster Recovery Preparation As

More information

WHY DO I NEED DATA PROTECTION SERVICES?

WHY DO I NEED DATA PROTECTION SERVICES? WHY DO I NEED DATA PROTECTION SERVICES? Data processing operations have evolved with breathtaking speed over the past few years, expanding from very large mainframe operations to small business networks.

More information

M4 Systems. M4 Online Backup. M4 Systems Ltd Tel: 0845 5000 777 International: +44 (0)1443 863910 www.m4systems.com www.dynamicsplus.

M4 Systems. M4 Online Backup. M4 Systems Ltd Tel: 0845 5000 777 International: +44 (0)1443 863910 www.m4systems.com www.dynamicsplus. M4 Systems M4 Online Backup M4 Systems Ltd Tel: 0845 5000 777 International: +44 (0)1443 863910 www.m4systems.com www.dynamicsplus.net Table of Contents Introduction... 3 Benefits... 3 Features... 4 Data

More information

inforouter Version 8.0 Administrator s Backup, Restore & Disaster Recovery Guide

inforouter Version 8.0 Administrator s Backup, Restore & Disaster Recovery Guide inforouter Version 8.0 Administrator s Backup, Restore & Disaster Recovery Guide Active Innovations, Inc. Names of all products herein are used for identification purposes only and are trademarks and/or

More information

Manufacturers Need More Than Just Backup... But they don t need to spend more! axcient.com

Manufacturers Need More Than Just Backup... But they don t need to spend more! axcient.com Manufacturers Need More Than Just Backup... But they don t need to spend more! axcient.com Introduction Manufacturers need to keep their businesses up and running more than ever now. Automating work processes

More information

SCHEDULE A DEMO BACKUP AND RECOVERY. deliver true Business Continuity in one, powerful, integrated system.

SCHEDULE A DEMO BACKUP AND RECOVERY. deliver true Business Continuity in one, powerful, integrated system. deliver true Business Continuity in one, powerful, integrated system. Protect Your Business: instantly restore entire systems, email boxes, databases in minutes Backups Verified: each backup is verified

More information

CENTER FOR NUCLEAR WASTE REGULATORY ANALYSES

CENTER FOR NUCLEAR WASTE REGULATORY ANALYSES Page 1 of 5 ELECTRONIC FILE ARCHIVAL AND BACKUP PROCEDURES EFFECTIVITY AND APPROVAL Revision 1 of this procedure became effective on July 6, 2004. This procedure consists of the pages and changes listed

More information

WHY CLOUD BACKUP: TOP 10 REASONS

WHY CLOUD BACKUP: TOP 10 REASONS WHITE PAPER DATA PROTECTION WHY CLOUD BACKUP: TOP 10 REASONS Contents REASON #1: Achieve disaster recovery with secure offsite cloud backup REASON #2: Freedom from manual and complex tape backup tasks

More information

REMOTE BACKUP-WHY SO VITAL?

REMOTE BACKUP-WHY SO VITAL? REMOTE BACKUP-WHY SO VITAL? Any time your company s data or applications become unavailable due to system failure or other disaster, this can quickly translate into lost revenue for your business. Remote

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October

More information

What You Should Know About Cloud- Based Data Backup

What You Should Know About Cloud- Based Data Backup What You Should Know About Cloud- Based Data Backup An Executive s Guide to Data Backup and Disaster Recovery Matt Zeman 3Fold IT, LLC PO Box #1350 Grafton, WI 53024 Telephone: (844) 3Fold IT Email: Matt@3FoldIT.com

More information

Leveraging Virtualization for Disaster Recovery in Your Growing Business

Leveraging Virtualization for Disaster Recovery in Your Growing Business Leveraging Virtualization for Disaster Recovery in Your Growing Business Contents What is Disaster Recovery?..................................... 2 Leveraging Virtualization to Significantly Improve Disaster

More information

Contract # 04-06. Accepted on: March 29, 2005. Starling Systems. 711 S. Capitol Way, Suite 301 Olympia, WA 98501

Contract # 04-06. Accepted on: March 29, 2005. Starling Systems. 711 S. Capitol Way, Suite 301 Olympia, WA 98501 Disaster Recovery Plan Starling Systems Deliverable #15 - Draft I Contract # 04-06 Accepted on: March 29, 2005 Starling Systems 711 S. Capitol Way, Suite 301 Olympia, WA 98501 DISASTER RECOVERY PLAN TABLE

More information

Backup and Recovery. What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases

Backup and Recovery. What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases Backup and Recovery What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases CONTENTS Introduction 3 Terminology and concepts 3 Database files that make up a database 3 Client-side

More information

Data Management and Retention for Standards Consortia

Data Management and Retention for Standards Consortia Data Management and Retention for Standards Consortia An Overview 15 May, 2006 Prepared by: Jeremy Towsey-French jfrench@kavi.com Kavi Corporation 1 of 6 Copyright 2006 All rights reserved Data Management

More information

2014 StorageCraft. All rights reserved. UK CASE STUDY: ZENZERO IT Solutions

2014 StorageCraft. All rights reserved. UK CASE STUDY: ZENZERO IT Solutions 1 UK CASE STUDY: ZENZERO IT Solutions Interview with Zenzero Solutions' Director, Will Brooks StorageCraft spoke to Will Brooks, Commercial Director of Zenzero, on how Zenzero have switched over to using

More information

Online Disaster Recovery, Backup & Archive Solutions. VirtuousIT Ltd.

Online Disaster Recovery, Backup & Archive Solutions. VirtuousIT Ltd. VirtuousIT Ltd 1 Table of Contents 1 Introduction 3 The Data Explosion 3 The Importance of Rapid System Recovery 3 2 The VirtuousIT Solution 4 3 RecoveryShield - Solutions 5 Large Business 5 Small Medium

More information

Introduction. Setup of Exchange in a VM. VMware Infrastructure

Introduction. Setup of Exchange in a VM. VMware Infrastructure Introduction VMware Infrastructure is deployed in data centers for deploying mission critical applications. Deployment of Microsoft Exchange is a very important task for the IT staff. Email system is an

More information

UMHLABUYALINGANA MUNICIPALITY

UMHLABUYALINGANA MUNICIPALITY UMHLABUYALINGANA MUNICIPALITY BACKUP AND RESTORE POLICY Backup and Restore Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Originator Recommended by Director of

More information

Disaster Recovery for Small Businesses

Disaster Recovery for Small Businesses Technical White Paper Disaster Recovery for Small Businesses A disaster recovery plan helps you understand what data is critical to your business operations and how to best protect it from unexpected failures.

More information

WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery

WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery WHITE PAPER HIPPA Compliance and Secure Online Data Backup and Disaster Recovery January 2006 HIPAA Compliance and the IT Portfolio Online Backup Service Introduction October 2004 In 1996, Congress passed

More information

Disaster Recovery Planning Save Your Business

Disaster Recovery Planning Save Your Business Disaster Recovery Planning Save Your Business Your business at risk! Your company is at risk for failure in the event of disaster Your data is at risk for costly loss Your revenue is at risk with lack

More information

Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection

Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection The gold standard in Windows data protection Overview Symantec Backup Exec 12.5 delivers market-leading backup and recovery protection from server to desktop, providing complete data protection for the

More information

Virtualization s Evolution

Virtualization s Evolution Virtualization s Evolution Expect more from your IT solutions. Virtualization s Evolution In 2009, most Quebec businesses no longer question the relevancy of virtualizing their infrastructure. Rather,

More information

2013 Cloud Storage Expectations

2013 Cloud Storage Expectations 2013 Cloud Storage Expectations cloud A recent TechTarget Survey suggests that while many IT budgets are decreasing or remaining flat, cloud projects are still on the rise and will continue to be throughout

More information

Planning and Implementing Disaster Recovery for DICOM Medical Images

Planning and Implementing Disaster Recovery for DICOM Medical Images Planning and Implementing Disaster Recovery for DICOM Medical Images A White Paper for Healthcare Imaging and IT Professionals I. Introduction It s a given - disaster will strike your medical imaging data

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

Financial Services Need More than Just Backup... But they don t need to spend more! axcient.com

Financial Services Need More than Just Backup... But they don t need to spend more! axcient.com Financial Services Need More than Just Backup... But they don t need to spend more! axcient.com Introduction Financial institutions need to keep their businesses up and running more than ever now. Considering

More information

Getting Your Practice Ahead

Getting Your Practice Ahead Volume 4: Data Backup Essentials For Physicians Edited By : Vinod Venugopal Disclaimer: The following document was created for free distribution by Technical Doctor Inc. The document contains reference

More information

WHITE PAPER. Acronis Backup & Recovery 10 Overview

WHITE PAPER. Acronis Backup & Recovery 10 Overview Acronis Backup & Recovery 10 Overview Copyright Acronis, Inc., 2000 2009 Table of contents Executive Summary... 3 The Next Generation Backup and Recovery Solution from Acronis... 4 New! Scaleable Architecture

More information

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores

More information

Enterprise Backup Solution Vendor Questions

Enterprise Backup Solution Vendor Questions Enterprise Backup Solution Vendor Questions What is the size of a single full back up? If Backups comprise 28% of the 19TB, can we assume that a single full (not compressed) is approximately 6TB? The approximate

More information

Backup and Redundancy

Backup and Redundancy Backup and Redundancy White Paper NEC s UC for Business Backup and Redundancy allow businesses to operate with confidence, providing security for themselves and their customers. When a server goes down

More information

IT Service Management

IT Service Management IT Service Management Service Continuity Methods (Disaster Recovery Planning) White Paper Prepared by: Rick Leopoldi May 25, 2002 Copyright 2001. All rights reserved. Duplication of this document or extraction

More information

DISASTER RECOVERY PLANNING GUIDE

DISASTER RECOVERY PLANNING GUIDE DISASTER RECOVERY PLANNING GUIDE AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING FOR JD EDWARDS SOFTWARE CUSTOMERS www.wts.com WTS Disaster Recovery Planning Guide Page 1 Introduction This guide will provide

More information

The advantages to a typical business are enormous:

The advantages to a typical business are enormous: The average business has $30,000 worth of computer data. We have found that many of them have little or no protection at all. To a business owner, your data is priceless. The loss of your data can put

More information

Disaster Recovery: Helping Non-Profits to Plan, Prepare & Recover. By: Lynn Do

Disaster Recovery: Helping Non-Profits to Plan, Prepare & Recover. By: Lynn Do Disaster Recovery: Helping Non-Profits to Plan, Prepare & Recover By: Lynn Do It is Prepare to Ensure Business Continuity A way of doing business and continuing to stay in business in the event of a disaster

More information

Why is online backup replacing tape? WHITEPAPER

Why is online backup replacing tape? WHITEPAPER Why is online backup replacing tape? WHITEPAPER By 2008, the majority of data restores will occur from disk, not from tape. Gartner Group www.jcom.co.uk/cloudsecure 1 As there are many shortcomings of

More information

How To Protect Data On Network Attached Storage (Nas) From Disaster

How To Protect Data On Network Attached Storage (Nas) From Disaster White Paper EMC FOR NETWORK ATTACHED STORAGE (NAS) BACKUP AND RECOVERY Abstract This white paper provides an overview of EMC s industry leading backup and recovery solutions for NAS systems. It also explains

More information

Virtual Disaster Recovery

Virtual Disaster Recovery Virtual Disaster Recovery White Paper September 16, 2008 Kelly Laughton Davenport Group Consultant Davenport Group 2008. All rights reserved. Introduction Today s data center has evolved into a complex,

More information

Business Continuity Plans- Technology. Preparation Instructions. Inventory and Assessment. System Backup Procedures

Business Continuity Plans- Technology. Preparation Instructions. Inventory and Assessment. System Backup Procedures Business Continuity Plans- Technology Preparation Instructions Lutheran Community Services Northwest has operational offices in almost 30 separate locations throughout the states of Washington, Oregon,

More information

Email Continuity protecting your business against email downtime

Email Continuity protecting your business against email downtime protecting your business against email downtime Email is a critical communications tool. Email downtime means a loss of productivity, possible compliance and regulatory issues related to data loss, or

More information

Solution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments

Solution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments Unified Information Management for Complex Windows Environments The Explosion of Unstructured Information It is estimated that email, documents, presentations, and other types of unstructured information

More information

With a Data Backup Plan, Your Business is Safe. NCGIT.com

With a Data Backup Plan, Your Business is Safe. NCGIT.com With a Data Backup Plan, Your Business is Safe NCGIT.com With a Data Backup Plan, Your Business is Safe 2 NCGIT.com Why do I need a backup and disaster recovery plan? Your company s most valuable asset

More information

WHAT IS DISASTER RECOVERY

WHAT IS DISASTER RECOVERY WHAT IS DISASTER RECOVERY The definition of Disaster Recovery' tends to vary widely from company to company and is a difficult term to define because it changes and is so varied in each situation. And

More information

Tiered Storage Management and Design

Tiered Storage Management and Design Designing and Managing a Tiered Storage Environment Transforming IT Executive Summary: Enterprise storage costs are spiraling out of control. Demands for storage capacity have been exponentially increasing

More information

ILM: Tiered Services & The Need For Classification

ILM: Tiered Services & The Need For Classification ILM: Tiered Services & The Need For Classification Edgar StPierre, EMC 2 SNW San Diego April 2007 SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies

More information

Whitepaper. Disaster Recovery as a Service (DRaaS): A DR solution for all

Whitepaper. Disaster Recovery as a Service (DRaaS): A DR solution for all Whitepaper Disaster Recovery as a Service (DRaaS): A DR solution for all Disaster Recovery as a service: A DR solution for all Disaster Recovery (DR) is more important today than ever before. Why? Because

More information

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public] IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System

More information

Oregon-Montana Disaster Recovery Phase 1 & 2

Oregon-Montana Disaster Recovery Phase 1 & 2 Oregon-Montana Disaster Recovery Phase 1 & 2 Oregon Department of Administrative Services Enterprise Technology Services http://www.oregon.gov/das/ets/pages/index.aspx Category: Disaster Recovery/Security

More information