VERITAS Confidential
Copyright © 2005 VERITAS Software Corporation. All rights reserved. VERITAS, the VERITAS Logo and all other VERITAS product names and slogans are trademarks or registered trademarks of VERITAS Software Corporation. VERITAS, the VERITAS Logo Reg. U.S. Pat. & Tm. Off. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Specifications and product offerings subject to change without notice.
VERITAS Confidential
Protect Your NetworkWhy Disaster Recovery Is
Important
VERITAS Confidential
Who is VERITAS Software?
• World’s Largest Storage Software Company– US$2.04BN Revenues– Over 7000 Employees– 40 Countries
• 99% of Fortune 500 Rely on VERITAS Software
VERITAS Confidential
VERITAS Data Protection Leader
Backup & Recovery
World Wide Cross Platform
Windows
Backup & Recovery
VERITAS Confidential
Part 1What is Disaster Recovery
and what can you do about it?
VERITAS Confidential
What is Disaster Recovery?Knowing the Difference
• Business Continuity– Business Continuity Management is a holistic management
process that identifies potential impacts that threaten an organisation and provides a framework for building resilience and the capability for an effective response which safeguards the interests of its key stakeholders, reputation, brand and value creating activities. (Source: British Standards Institute PAS56)
• Disaster Recovery– Total loss of a computing environment from supporting the
business. Recovery of the computing environment from an error or major site failure. Subset of Business Continuity.
• High Availability– A rapid process to move a business transaction from a failed
component to a functioning component with minimal impact to the organisation and environment. Subset of Disaster Recovery.
VERITAS Confidential
Disaster RecoveryThings to Consider
• What is most important to any organisation?1. People
2. Data and systems
• Protecting data and systems is difficult– Data is growing 50-80% per year (source: Gartner)– IT infrastructure is complex
ServerApplication DatabaseWeb Server
Windows Environment
Storage
VERITAS Confidential
Disaster RecoveryHow Prepared Are Some Organisations?
• 38% of organisations in EMEA do not know how long it would take to recover from a fire disaster
– Average recovery time of organisations that do know is 3.23 days
– Only 3% said they could carry on with business as usual if a disaster happened
• Top 5 consequences of disasters:1. Decreased employee productivity (62%)
2. Data loss (43%)
3. Reduction in profits (40%)
4. Damage to customer relationships (38%)
5. Reduction in revenue (27%)
Source: VERITAS Disaster Recovery Research, Sept. 2004
VERITAS Confidential
Indirect Costs
Stock Price
ReputationMarket Share
Brand Equity
CustomerSatisfaction
DirectCosts
Lost Revenue
Lost Productivity
Revenue is the Focus of DisastersRevenue is the Focus of Disasters…but more than revenue is a risk…but more than revenue is a risk
Criminal Liability
VERITAS Confidential
LogicalOutages
ComponentOutages
SiteOutages
What Can Happen?Threats to Availability of Data and Systems
Software bug
Virus
Data corruption
Accidental delete
Dropped table
D.o.S. Attack
CPU fault
Disk failure
Array failure
Host Bus Adapter
Network Card
Software
Fire
Power Outage
Terrorism/War
Flooding
Storms
Hurricane
VERITAS Confidential
What Can Happen?Example: Blackouts (Power Outages)
Rome
New York
London
VERITAS Confidential
What Can Happen?Example: Data Corruption, Lost Data, Lost Productivity
• Lost productivity due to viruses in 2003 = $55 Billion
Source: Trend Micro, 3/28/2004
VERITAS Confidential
Are You Protected?Ask Yourself These Questions
• Have you ever lost data?– Gartner estimates that 40% of businesses that lose ALL their
data go out of business within 5 years.**
• How much would 1 hour of downtime cost you?– Only 26% of all organisations have calculated the cost of
downtime.*
• Do you test your disaster recovery plan yearly?– New studies say that up to 66% don’t.*
* Source: VERITAS Disaster Recovery Research, Sept. 2004
** Source: Gartner, Sept. 2001
VERITAS Confidential
Disaster Recovery Technologies
An explanation of core disaster recovery concepts and technologies.
VERITAS Confidential
Determining Your Recovery Needs
• Amount of data loss acceptable
• The point to which data must be restored
RECOVERY POINT OBJECTIVE
• Amount of time it takes to come back online
• The time by which data must be restored
RECOVERY TIME OBJECTIVE
Days MinsHrsWks Secs
Recovery PointRecovery Point
Mins DaysHrsSecs Wks
Recovery TimeRecovery Time
VERITAS Confidential
Determining Your Recovery Needs
Days MinsHrsWks Secs Mins DaysHrsSecs Wks
Recovery PointRecovery Point Recovery TimeRecovery Time
Tape Restore
ClusteringSnapshots
Replication
Tape Backup
Periodic Replication
Snapshots
HA Zone
VERITAS Confidential
Part 2Backup as the Cornerstone of a Solid
Disaster Recovery Strategy
VERITAS Confidential
• Only backup provides:– Cost-effective portability of data– Protection against complete data loss– Protection against viruses and data corruption– Managed multiple point-in-time copies of data– Integrated archival management– Integrated desktop/laptop protection
• Backup does not provide– Instant access to data (short RTO)– Minimum data loss (short RPO)
Why Backup Still MattersA Look at Key Issues
VERITAS Confidential
Laptop & Desktop DataWhat Are Companies Doing Today?
Network share is the most popular and least effective.
WHERE DO YOU FALL?
Network Share55%
Users Copy Locally7%
PC Backup Software7%
Synch Products4%
Software Solution6%
Server Backup6%
No Solution15%
VERITAS Confidential
Extending Data Protection
• IT Managers don’t have to worry about unprotected data– Protection occurs continuously, online to network storage or offline to the local
hard drive– Tailored to meet the special needs of laptop users
• Users have full access to all of their data– Synchronizes data between desktops and laptops, data resides where the user
needs it, designed for executives
• Integrates into existing IT infrastructure and policies, lowering TCO– Automates existing policy of having users copy data to existing network storage– Flexible, lightweight design with no large database or application to manage
• Limits IT Interaction with users, improving ROI– Users can restore their own files from network storage or local disk without
intervention
• Helps ensure regulatory and audit compliance
VERITAS Confidential
Summary
VERITAS Confidential
The Backup Advantage
• Backup is the cornerstone of any disaster recovery plan– Last line of defense
• For disaster recovery planning, the backup solution must provide:– Technologies that enable faster recovery and reduce
costs– System level protection, not just data– Automation that works when disaster strikes– Protection for servers and laptops/desktops
VERITAS Confidential
The VERITAS Advantage in Backup
• VERITAS is #1 in the backup and recovery market
• Backup Exec provides the foundation required for a complete disaster recovery plan
• Backup Exec integration with other VERITAS solutions means flexibility and also customization based on availability needs
VERITAS Confidential
Part 3Disaster Recovery Preparedness Exercise
VERITAS Confidential
Disaster Recovery Exercise
• Scoring:– Each YES gives 1 point
• Tips:– Be honest– There are no right or wrong answers– It’s okay to ask for help– If you don’t know the answer, then just guess
VERITAS Confidential
Question 1
Do you have a disaster recovery plan?
VERITAS Confidential
Question 2
Is your disaster recovery plan part of a larger business continuity plan?
VERITAS Confidential
Question 3
Does Sr. Management know about the disaster recovery plan?
VERITAS Confidential
Question 4
Do you use:
• Backup
• Replication
• Clustering
Each YES is 1 point
VERITAS Confidential
Question 5
Have you measured how much 1 day of downtime would cost you?
VERITAS Confidential
Question 6
Can you accurately say how quickly you can recover from a disaster?
VERITAS Confidential
Question 7
Do you test your disaster recovery plan weekly or monthly, or even quarterly?
(Yearly is not good enough!)
VERITAS Confidential
Question 8
Do you know your Recovery Point Objective for all customer-facing systems?
(Call Centre, Web Apps, etc.)
VERITAS Confidential
Question 9
Do you know your Recovery Point Objective for all partner-facing systems?
(Supply Chain, B-to-B Apps, etc.)
VERITAS Confidential
Question 10
Do you know your Recovery Point Objective for all internal-facing systems?
(Order Entry, Purchasing, Email, etc.)
VERITAS Confidential
Question 11
Do you store your tapes (data) offsite?
VERITAS Confidential
Question 12
Do you protect laptops?
VERITAS Confidential
Question 13
Do you protect desktops?
VERITAS Confidential
Results
• 15-13: A comprehensive DR plan that can withstand any disaster is in place.
• 12-10: A solid DR plan that can withstand most disasters is in place.
• 9-7: A basic DR plan is in place, but there are still many gaps.
• 6-4: If a disaster was to occur systems and data would be at serious risk.
• 3-1: You urgently need a DR plan. Start today!
VERITAS Confidential
THANK YOU!