+ All Categories
Home > Documents > Ies Axcient E Ufocuspreso[1]

Ies Axcient E Ufocuspreso[1]

Date post: 13-Jun-2015
Category:
Upload: integrated-enterprise-solutions-inc
View: 457 times
Download: 1 times
Share this document with a friend
Description:
Learn more about how IES + Axcient Busines Continuity Solutions = Peace of Mind
Popular Tags:
17
Copyright© 2010 Axcient, Inc. All Rights Reserved The Importance of Data Protection Copyright© 2010 Axcient, Inc. All Rights Reserved Nicole Dirksen Regional Sales Manager, Axcient +
Transcript
Page 1: Ies Axcient E Ufocuspreso[1]

Copyright© 2010 Axcient, Inc. All Rights Reserved

The Importance of Data Protection

Copyright© 2010 Axcient, Inc. All Rights Reserved

Nicole DirksenRegional Sales Manager, Axcient

+

Page 2: Ies Axcient E Ufocuspreso[1]

Copyright© 2010 Axcient, Inc. All Rights Reserved

2

Risk Mitigation and Preparedness – Responsible Thing to Do

2009 US Average: Cost of Car: $28,400Spent on Insurance: ~$150 per mo.

2009 US Average: Cost of Home: $270,000Spent on Insurance: ~$80 per mo.

What’s your Business Worth to You?

+

Page 3: Ies Axcient E Ufocuspreso[1]

Copyright© 2010 Axcient, Inc. All Rights Reserved

Employees, Customers & Data Without all three, you don’t have a business!

Yet, Statistics Indicate that:40% of Small and Medium Sized Businesses don’t back up their

dataOf those that do backup, ~50% of their backups are not fully

recoverable.

You can buy a new car. You can buy a new house.

You CAN’T buy years worth of data!3

Your Data & Applications – They’re at the Core of your Business

+

Page 4: Ies Axcient E Ufocuspreso[1]

Copyright© 2010 Axcient, Inc. All Rights Reserved

60% of companies that lose their data will shut down within 6 months of the disaster. (Gartner)

4

The Problem is Real: Data Loss Can Cost You Your Business

+

Page 5: Ies Axcient E Ufocuspreso[1]

Copyright© 2010 Axcient, Inc. All Rights Reserved

The Problem is Big and it’s Getting Bigger

5

1.Data volume increasing 30+% CAGR

2.Complexity of protection increasing

3.Downtime tolerance decreasing to < 3 hrs

Sources: IDC

# of Data Protection VendorsUsed By Medium-sized Businesses

Data Protection Often Fails

4 or more59%

110%

214%

317%

No35%

Don’t Know5%

Yes60%

No35%

Don’tknow

5%

4 ormore59%

110% 2

14%

317%

+

Page 6: Ies Axcient E Ufocuspreso[1]

Copyright© 2010 Axcient, Inc. All Rights Reserved

Natural disasters account for only 1% of all data loss

Software corruption accounts for 7% of all data loss

Human error accounts for 11% of all data loss

Hardware or system failure accounts for 78% of all data loss

6

There are Many Causes of Data Loss – Most are Not Disasters

+

Page 7: Ies Axcient E Ufocuspreso[1]

Copyright© 2010 Axcient, Inc. All Rights Reserved

Continuity (Continuous Access to Data and Applications)You are guaranteed to suffer productivity hits every yearEvery minute without access to key applications costs you moneyEvery minute you spend recovering data costs your moneyEvery piece of information you have to re-create costs you money

Disaster Recovery (Total Site Failure)You MUST be prepared for the possibility of theft, fire, flood, etc.Need to get up and running as fast as possible

7

Two Primary Components of Data Protection: Continuity and DR

You Need Both!

+

Page 8: Ies Axcient E Ufocuspreso[1]

Copyright© 2010 Axcient, Inc. All Rights Reserved

RecoverabilityFocus on restore speed and reliability, not on backupHow quickly can you access data and applications? How easy is it?

ComprehensivenessFewer vendors is better. One vendor is best.Make sure every source of data and every application is protected

Designed for Small and Medium Sized BusinessesThe solution should be built for the simplicity and ease of use of the SMB

AffordabilityLook at CapEx and Software license costs Expect to pay hundreds a month – you would for your car

8

There are 4 Key Criteria in Selecting a Data Protection Partner

+

Page 9: Ies Axcient E Ufocuspreso[1]

Copyright© 2010 Axcient, Inc. All Rights Reserved

Most SMB Data Protection Solutions are Overly Complicated

Backup• Application data and

files copied

Disaster Recovery Copy• All data sent offsite

Business Continuity• Entire machine image copied

Required!

Representative

Brands

• Software on each server• Software on each

desktop• Tape System• NAS Device

• Software on each server• Software on each

desktop• Backup server• Spare server to restore

to

• Tape machine and media

• FedEx or other• Vaulting facility OR• Internet-based service

Why? • Lost or corrupted data can be recovered

• A inoperable machine can be transferred and brought online

•Recover even are fire, flood, theft, sabotage or the backup becomes corrupted

9

What?

+

Page 10: Ies Axcient E Ufocuspreso[1]

Copyright© 2010 Axcient, Inc. All Rights Reserved

Backup Application data and files copied

Disaster Recovery Copy All data sent offsite

Business ContinuityEntire machine image copied

Required!

Representative

Brands

Software on each server Software on each desktop Backup server

Software on each server Software on each desktop Backup server Spare server to restore to

Tape machine and media FedEx or other• Vaulting facility OR Internet-based service

Why? Lost or corrupted data can be recovered

A inoperable machine can be transferred and brought online

Recover even are fire, flood, theft, sabotage or the backup becomes corrupted

10

What?

Most SMB Data Protection Solutions are Overly Complicated

+

Page 11: Ies Axcient E Ufocuspreso[1]

Copyright© 2010 Axcient, Inc. All Rights Reserved

The Axcient Advantage: Complete Data Protection, Simplified

+

Page 12: Ies Axcient E Ufocuspreso[1]

Copyright© 2010 Axcient, Inc. All Rights Reserved

Axcient: One Solution, from One Vendor, Delivered as A Service

Complete Data Protection as a Platform

12

Customer Site

Axcient SAS 70 II Data Centers

+

Page 13: Ies Axcient E Ufocuspreso[1]

Copyright© 2010 Axcient, Inc. All Rights Reserved 13

We Even Have You Covered Even if a Server Fails!

+

Page 14: Ies Axcient E Ufocuspreso[1]

Copyright© 2010 Axcient, Inc. All Rights Reserved 14

Axcient in Action: Real World Examples of Axcient Protection

+

Page 15: Ies Axcient E Ufocuspreso[1]

Copyright© 2010 Axcient, Inc. All Rights Reserved

NO Software to purchaseNO Hardware to purchaseNO Per User licenses

Laptop, Desktop and Server Protection (Windows, Mac, Linux)Total Data & Application ProtectionEven if your server fails, it will run on our platform in under an hour

We’ll take care of everything so you can focus on growing your business

Fully Managed, All for a Low Monthly Fee

15

Axcient + ThermoCopy = Affordable Uptime and Continuity Affordable

+

Page 16: Ies Axcient E Ufocuspreso[1]

Copyright© 2010 Axcient, Inc. All Rights Reserved

Nicole Dirksen, Regional Sales Manager

[email protected]

800-715-2339

16

Integrated Enterprise Solutions, IncJulie Gerrard, Business Development [email protected](845) 226-9983 Ext. 125

+

Page 17: Ies Axcient E Ufocuspreso[1]

Copyright© 2010 Axcient, Inc. All Rights Reserved

Axcient vs Traditional Method

Axcient Savings$3010 per month / $36,120 per year

Additional benefits include:

• Rapid restoration of the company’s messaging systems in the event of failure

• Ability to instantly restore an email or user in Microsoft Exchange

• Protection of Laptops and Desktops (whereas they were not protected before)

- including Mac, Windows and Linux systems

• Less risk of data loss due to automated, remote disaster recovery copies.

Typical Method ofData Protection ForSmalland MediumBusinesses

Costof in-house ITdedicated to data protection

FedExcosts fordisasterrecoverycopies

Tape vaulting service

Average monthly software maintenance

Tape vault recall (there were two lastyear)

Tape media and maintenance

Allocation Per Month

$4,020

$1,010

Realcostsper monthunderpresent method

Axcientprice including service

1/3 of time = ($92k x .33) /12

$20 a package * 3 times a week

Monthly service

3 application servers, 1 file server

Average over 12 months

Average over 12 months

$2,530

$240

$300

+


Recommended