1 / 13

What we will cover today

What we will cover today. What is Business Continuity? What component is data? What can you realistically offer? Break for questions How does Zenith help you provide the solution? Break for questions. What is Business Continuity?. Phones. Building. Crisis Managers. People.

mills
Télécharger la présentation

What we will cover today

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. What we will cover today • What is Business Continuity? • What component is data? • What can you realistically offer? • Break for questions • How does Zenith help you provide the solution? • Break for questions Page 1

  2. What is Business Continuity? Phones Building Crisis Managers People Your Clients Business Processes Communication Systems Data Systems Page 2

  3. Business Impact Analysis (BIA) - Foundations RTO (Recovery Time Objective): How quickly do you want to be fully operational in? Is this time different for different situations? RPO (Recovery Point Objective): How much data can you afford to lose? Is the amount of data loss dependent upon the type of “disaster”? RSL (Recovery Service Level): What level of performance is required for each type of “disaster”? What is Business Continuity? Page 3

  4. Business Impact Analysis (BIA) - Foundations RTO vs. RPO What is Business Continuity? RPO RTO Page 4

  5. Threat Analysis Nature: Fire, Flood, Hurricanes, etc. Man: Theft, Viruses, Terrorism, etc. Technical: System Failure, Accidental Data Deletion Failure to comply with regulations: HIPAA, SOX, PCI What is Business Continuity? Page 5

  6. ICE (In Case of Emergency) document The numbers and types of desks, whether dedicated or shared, required outside of the primary business location in the secondary location The individuals involved in the recovery effort along with their contact and technical details The applications and application data required from the secondary location desks for critical business functions The manual workaround solutions The maximum outage allowed for the applications The peripheral requirements like printers, copier, fax machine, calculators, paper, pens etc Other documents (stock certs, etc.) What is Business Continuity? Page 6

  7. So what can you easily provide? Core Data Protection What makes this up? Backup of data (both server environments and client data) Where can you provide it? Local Remote What can you realistically offer? Page 7

  8. So what can you easily provide? Core Data Environment Protection What makes this up? Ability to bring up a replica (based upon RTO, RPO and RSL) of the client environment. Where can you provide it? Local Remote What can you realistically offer? Page 8

  9. Questions? Page 9

  10. Core Data Protection Core Data Environment Protection So how can Zenith help you? Page 10

  11. Core Data Protection MirrorCloud So how can Zenith help you? TMDF MirrorCloud Servers iSCSI TMDF NAS (low cost) Transporter/Tools Page 11

  12. Core Data Environment Protection MirrorCloud/SSO So how can Zenith help you? MirrorCloud Servers NAS (low cost) Transporter/Tools Page 12

  13. Questions? Page 13

More Related