The New Face of Data Protection Strategies for Changing Times Electronic Vaulting Services Data Solutions To Increase the Recoverability and Availability of All Critical Information Steve Leavitt, Manager Electronic Vaulting Solutions 508-808-7368 steve.leavitt@ironmountain.com
Agenda Iron Mountain Overview Importance of Data Data Protection Challenges Iron Mountain Electronic Vaulting Solutions Q& A
Who is Iron Mountain Records Management Health Information Services Digital Archives Consulting Information Product Fulfillment Records Management Reduced Cost Easy access Management & control Risk management Off-Site Data Vaulting Electronic Vaulting Consulting Data Backup & Recovery Services Protection of backup computer data Currency of backup data Rapid restore Process discipline Technology Escrow Vital Records Protection Film & Sound Archives Confidential Destruction Information Protection & Preservation Privacy & security Software licensing Long-term preservation
The Importance of Data What is driving the need for secure data recovery as part of your DR/BC planning?
Tech Dependence Availability Req s Zero Tolerance for Data Loss Under Pressure You Regulatory Sarbanes Oxley SEC Rule 17a HIPAA Rule 26 + 34 Sabotage Hackers & Crackers Denial of Service Virus & Worm Attacks Internal Employees Security Inadvertent Disclosure Unencrypted Data Economic Best Plan @ Lowest Cost Do More with Less Data w/ Budget Resource Allocations
Data KEY Resource Information is the key to any company s success and survival More and more, a company s information is stored electronically sometimes exclusively IT departments are charged with protecting this critical asset Information in the form of electronic data Protecting this critical asset Information has to encompass backup AND recovery
DATA GROWTH More information will be created over the next two years than in the entire history of mankind 2005 24B Source: UC Berkeley 40,000 BCE cave paintings bone tools 3500 writing 0 C.E. paper 105 1450 printing 1870 electricity, telephone transistor 1947 computing 1950 Late 1960s Internet (DARPA) 1993 The web 2004 12B 2002 6B 2000 3B GIGABYTES 1999
Primary Focus Central Data Location Highly Controlled Environment Consistent Data B/up Primary Focus Distributed Systems Repeatable Processes Web Services Little/No Encryption
Critical Data Is Migrating To Branch/Remote Offices Stand Alone Backup Challenges: Resource constraints Inefficient or no b/up procedures Mechanical Errors Inconsistency Backups performed by non-it staff 60% of Network Backups Fail* Central Data Center Frame Relay VPN Tunnel Network Backup Strengths: Centralized Backup Challenges: Unencrypted data Shrinking B/U window Bandwidth Constraints Complex to Admin Branch
The Mobile Challenge Workstation Up to 60% of Corporate Data is on PCs Mobile Workforce 60% of Corporate Data stored on PCs* 15% of Corporate Laptops fail annually* 10% of Corporate Laptops stolen/misplaced annually*
Causes of Business Interruption 80 70 60 50 40 30 % of Companies Reporting 20 10 0 Natural Disasters Facilities Move Hardware Failure Software Failure Human Error Power Outage Communications Failure Source: KPMG 1998 2000
Recovery in the Balance RTO RPO $ Recovery Time Objective (RTO): How long can you be without the data? Recovery Point Objective (RPO): How much data loss can you afford? Balancing Cost and Recoverability Disaster Recoverability has a cost: Additional Hardware Additional Personnel Fees for Services
Electronic Vaulting Overview What are companies doing to address some of the issues mentioned prior?
National Underground Facility Server Electronic Vaulting Overview Secure Connection AES 256 Bit Encryption VPN/Tunneling Digital Certificates Windows, Linux Red Hat, Solaris Optional Onsite Appliance for improved Recovery Time Secondary Historical Data Sydney
Server Electronic Vaulting Localized Recovery Point Option Offered as a Fully Managed Service Not a hosted application Five Flexible Retention Periods Does not require plug-ins for DB or Open File Handling Provides 99.999% availability for both backups and recoveries
PC Electronic Vaulting Overview Boston Facility PCs at HQ Traveling Laptops AES 128 Bit Encryption Compression/Delta Block Send Once Email Optimization Mirrored Location 30 Day Secondary Retention
PC Electronic Vaulting Foundation for Cost Reductions Reduce Capital Equipment Expenditures Significant Cost Savings associated with support Migration/Technology Refresh Increase User Productivity/Eliminate End User Downtime from your environment
Email Continuity Email Continuity services offer a highly scalable, standby messaging system that can be activated instantly providing uninterrupted access to email services in the event that the organization s primary mail service becomes unavailable. No Matter What!
Email Continuity What does it offer? Provides 99.999% email availability at 10% of the cost for other DR alternatives Makes sure that email outages are not evident to the outside world Provides employees with secure and immediate access to email from any location during an email outage Can deploy for an entire organization in less than a day
Tech Dependence Availability Req s Zero Tolerance for Data Loss Under Pressure Sarbanes Oxley SEC Rule 17a HIPAA Rule 26 + 34 Sabotage Hackers & Crackers Denial of Service Virus & Worm Attacks Internal Employees Security Inadvertent Disclosure Unencrypted Data Economic Best Plan @ Lowest Cost Do More with Less Data w/ Budget Resource Allocations
Pressure Relieved Tech Dependence Availability Req s Zero Tolerance for Data Loss Sarbanes Oxley SEC Rule 17a HIPAA Rule 26 + 34 Sabotage Hackers & Crackers Denial of Service Virus & Worm Attacks Internal Employees Security Inadvertent Disclosure Unencrypted Data Economic Best Plan @ Lowest Cost Do More with Less Data w/ Budget Resource Allocations
The New Face of Data Protection Strategies for Changing Times Q & A
The New Face of Data Protection Strategies for Changing Times thank you Steve Leavitt, Manager Electronic Vaulting Solutions steve.leavitt@ironmountain.com 508-808-7368