complete data protection from [insert software name] insert logo

13
Complete Data Protection from [INSERT SOFTWARE NAME] Insert logo

Upload: chloe-walton

Post on 23-Dec-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Complete Data Protection from [INSERT SOFTWARE NAME] Insert logo

Complete Data Protection from

[INSERT SOFTWARE NAME]

Insert logo

Page 2: Complete Data Protection from [INSERT SOFTWARE NAME] Insert logo

Agenda

• Mission-critical Data

• The Cost of Downtime

• Insure Your Business With Backup

• Types of Backup

• Complete Data Protection from [YOUR BACKUP SOLUTION]

Page 3: Complete Data Protection from [INSERT SOFTWARE NAME] Insert logo

Financial data

Payroll info

Email systems

Software programs

Business applications

Customer data

HR docs / employee information

And more

You Have More Data to Protect Than Ever

Page 4: Complete Data Protection from [INSERT SOFTWARE NAME] Insert logo

4

The data loss threat

FireTheft

User Error

Natural Disaster

Viruses

Equipment Failure

Page 5: Complete Data Protection from [INSERT SOFTWARE NAME] Insert logo

5

In the U.S. Alone …15,000 hard

drives fail every day

93% of SMBs who lose

data access for 10+ days

are bankrupt in 1 year *

* National Archives & Records Administration in Washington, DC

Page 6: Complete Data Protection from [INSERT SOFTWARE NAME] Insert logo

$$

$

The Cost of Downtime

SMBs lose

$7K-$74K for each hour of downtime.

40% of all companies that

experience a major disaster will go out of business if they

cannot gain access to their data within

24 hours.

96 % of

all business workstations are

currently not being backed

up at all.

Lindsay Faria
Need better graphics here. Can Chuck help?
Page 7: Complete Data Protection from [INSERT SOFTWARE NAME] Insert logo

Insure Your Business With Backup

Key elements of a disaster data

recovery plan:

Establish priorities for applications and networks

Payroll, financials, email, etc.

Develop recovery strategies

Where do you want data

recovered to?

Prepare inventory and

documentationof the plan

Page 8: Complete Data Protection from [INSERT SOFTWARE NAME] Insert logo

Types of Backup

• Portable− CDs, tapes or external hard drives

• Onsite (local) data storage

• Cloud backup

• Virtualization

Page 9: Complete Data Protection from [INSERT SOFTWARE NAME] Insert logo

Complete Data Protection From [YOUR COMPANY]

• Fully supported by our IT experts− Files and Folders

− Exchange, SQL and System State

− VMware images

− Hyper-V Backup and Rapid Recovery

Page 10: Complete Data Protection from [INSERT SOFTWARE NAME] Insert logo

The [YOUR COMPANY] Advantage

• Easy to use− Easy installation and a quick start

− Automatic backups

− Manage local and offsite backups

− Handles remote devices like laptops

Page 11: Complete Data Protection from [INSERT SOFTWARE NAME] Insert logo

The [YOUR COMPANY] Advantage

• Secure and reliable

• Two secure, SSAE 16 Type II data centers

• Military-grade encryption with private key option

• Offsite and local backup for reliability and speed

Page 12: Complete Data Protection from [INSERT SOFTWARE NAME] Insert logo

The [YOUR COMPANY] Advantage

• Business grade− Robust, flexible archiving

− Multiple revisions

− Reporting and notifications

− Multiple device support

Page 13: Complete Data Protection from [INSERT SOFTWARE NAME] Insert logo

Thank You.

INSERT YOUR CONTACT INFO HERE