What is a Disaster?
Download
Report
Transcript What is a Disaster?
How to Ensure Your Business
Survives, Even if Your Server Crashes
Backup Fast, Recover Faster
Fast and Reliable Disaster Recovery, Data Protection,
System Migration and Simplified Management
of Microsoft® Systems with ShadowProtect™
StorageCraft Technology Corporation
Backup Fast, Recover Faster
StorageCraft Company Overview
Disaster Recovery and Data Protection Planning for Your Organization
Maximizing Business Continuity / Avoid Lost Opportunities
Methods to Maximize Business Continuity
File and Folder Recovery
Bare Metal Recovery
ShadowProtect Overview
System Migration Planning for Your Organization
StorageCraft Technology Corporation
Company Overview
Founded in 1999 as StorageCraft, Inc.
Headquarters in Draper, Utah, USA
ShadowProtect product family
Disk-based backup, disaster recovery, data protection – P2P
System migration & consolidation – P2V, V2P and V2V
Millions of installations worldwide on servers, desktops and laptops
Licensed to software and hardware manufacturers
What is a Disaster?
Business Continuity and Disaster Recovery
Anything that disrupts business continuity
Common Disasters
Uncommon (Extreme disasters)
Common Disasters
Most common disasters can be overcome with a local or near-line
backup and DR plan
Equipment Failure
Operator Error
Service Pack updates
Viruses
Uncommon Disasters
Require both a near-line and offsite backup and DR plan
Theft
Fire
Flood
Earthquake
Tornado
Terrorist Attack
Examples: Katrina, Southern California Wildfires, Earthquakes
Disaster Recovery and Data Protection Planning
Keys to Maximize Business Continuity
Business continuity is critical for any organization to be
successful.
Your disaster recovery and data protection plan must have a high
level of reliability.
Downtime will occur – hardware & software failure, operator error.
Backup is important, but disaster recovery is key to maximize
business continuity.
What is the price of downtime in your organization?
Types of Disaster Recovery Planning
Alternatives for Protecting Systems, Applications and Data
File and Folder Backup / Protection
Image / System Based Backup
File and Folder Backup and DR
One Alternative for Protecting Systems, Applications and Data
Advantages
Administrator can select the specific files and folders to protect.
Multiple versions of files may be retained.
Files and folders can be quickly recovered if the system is accessible.
Both near-line and offsite options are available.
Disadvantages
The system must be rebuilt in the event of a system failure.
Depending on the media, this can be a very tedious process.
Example: Tape is an excellent compliance and archiving media, but can be
an extremely slow recovery option. For business continuity, disk-based
image backup can be a much faster and more accessible option.
Image Based Backup and DR
One Alternative for Protecting Systems, Applications and Data
Advantages
The entire volume can be backed up, including OS, Settings, Applications and
Data.
Recovery can occur based on an exact point in time – before business
continuity was disrupted.
Files and folders can be recovered in the event of a ‘common’ disaster.
Disk media is typically used, which is faster and more reliable than tape.
Recovery options are available to same system, dissimilar hardware or virtual
environments.
Image Based Backup and DR
One Alternative for Protecting Systems, Applications and Data
Disadvantages
The initial backup (base) can be large, making it more difficult to transport offsite.
Incremental backups can be very fast, but differential images may be more time
consuming and resource intensive.
It’s About the Recovery
Keys to Maximize Business Continuity
No DR and Data Protection service is complete if it hasn’t been tested!
Fire Drill Example
Things can go wrong – make sure you know what they are.
Have you tested your current DR process?
Your strategy needs to incorporate options for portability so that you can
test on non-production systems.
Verification! Your DR and data protection plan must address verification
so that you know that your backups are reliable.
Best Practices for DR and Data Protection Planning
Keys to Maximize Business Continuity
Incorporate both near-line and off-site backup
Addresses both common and extreme disasters.
Provides a level of redundancy that ensures data is protected.
Example:
Best Practices for Backup and Disaster Recovery
Flexibility is Mandatory
Objective #1 is the fastest DR possible in order to ensure business
continuity.
Recovery must be possible in both common and extreme disasters.
Full system recovery (operating system, applications, settings and
data) is a must.
Critical data (file and folder) recovery is convenient in the event of
common disasters.
You must be able to recover to the available hardware resources that
you have on-hand.
ShadowProtect 4 Product Family
ShadowProtect Server™
ShadowProtect Small Business Server™
ShadowProtect ImageManager Enterprise™
ShadowProtect Desktop™
ShadowProtect 4 Benefits
Simplify System Backup, Recovery, Migration and Management
Minimize Your Recovery Time Objective (RTO)
Maximize Business Continuity
Save Money and Minimize Lost Business Opportunities
Simplify Backup and Disaster Recovery Management
ShadowProtect 4 Features
Simplify System Backup, Recovery, Migration and Management
Reliable Backup
Volume-level full, incremental and differential disk-based backups
Exact point-in-time backups of the operating system, applications,
configuration & network settings and data
Fast Recovery
Hardware Independent Restore™ (HIR)
Bare metal, file & folder recovery
Recovery to the same system, dissimilar hardware, to and from virtual
environments
ShadowProtect 4 Features (Cont.)
Simplify System Backup, Recovery, Migration and Management
Enhanced Enterprise Features – ShadowProtect ImageManager
HeadStart Restore™ - (ImageManager Enterprise)
Replication - (ImageManager Enterprise)
Consolidation
Verification
Notification
ShadowProtect ImageManager HeadStart Restore
How Does It Work?
ShadowProtect HeadStart Restore
creates a system restore job that
tracks backup changes in a staged
virtual machine.
The system restore job is updated
with incremental changes throughout the
day.
In the event of a disaster, the restore
job is finalized, the virtual machine is
prepared with ShadowProtect HIR
and the server is rebooted.
Recovery is complete in minutes rather
than hours or days – even with terabytes
of data on your server.
ShadowProtect Hardware Independent Restore
How Does It Work?
ShadowProtect provides rapid full bare
metal recovery through a bootable
recovery CD.
Hardware Independent Restore (HIR)
uses a library of drivers on the recovery
CD to detect new hardware.
If drivers are not found on the recovery
CD, they can be added as part of the
HIR process.
HIR allows you to rapidly recover to the
same system, dissimilar hardware or to
and from virtual environments.
Product Demo
ShadowProtect 4