PowerPoint Presentation Comprehensive Protection for all Your Critical Data Presented by: David Foster Armada Cloud Welcome! Over the next 30 minutes I would like to take you through a presentation to discuss the importance of a reliable, secure and manageable Enterprise-class cloud based data backup and recovery solution is to your organization along with how our service can help ensure that all of your corporate data can be comprehensively protected in a way that is aligned with your business needs based on your recovery point and recovery time objectives – providing you with a single, comprehensive data protection solution that gives you transparent visibility and complete control over all your corporate data sources. 1 Today’s Organizations Face a Huge Risk You have critical corporate data everywhere… Servers, virtual machines, databases, applications in your data center Endpoints like workstations, laptops, tablets, and smartphones SaaS apps like Microsoft Office 365, Salesforce.com, Google Apps PaaS like Amazon Web Services, Microsoft Azure Could your organization survive loss of critical data, a data breach, or a non-compliance violation? Or would it just hurt – a lot? What kind of data protection ‘insurance policy’ do you have in place for your organization? 2 1 - Today’s organizations have more data in more locations - than ever before. Whether they realize it or not, much of that data is critical – including things such as customer lists, emails, personal information, business plans, etc. As a result, today’s organizations also have more data-related government regulations, security concerns, and other considerations to deal with - than ever before. Not surprisingly, many organizations are struggling, as evidenced by the constant news parade of enterprises brought to their knees or facing huge fines as a result of data breaches, loss, or non-compliance. 2- Looking at your own organization, how would a major data loss, data breach, or non-compliance event impact your business? 3 - What steps have you taken to ensure none of that critical data will be lost? If you are like many organizations, you have deployed a hodge-podge of heterogeneous data protection solutions over the years as new data sources were added. The result is that you now have an overall, organization-wide data protection system that is highly complex. Even worse, you really can’t be certain that you don’t have serious data protection gaps somewhere in your organization. 2 How exposed is your organization today? Are you 100% confident that all critical data assets are fully protected and secure today? Does your existing data protection give you a single transparent view of your protection levels across all your corporate data sources? Does your existing data protection allow you to adapt quickly and easily to new platforms and applications? Is your existing data protection strategy becoming more complex? Does your existing data protection solution keep you compliant with regulations like HIPAA, HITECH, and SOX? 3 We know that everyone some level of data protection in place but is it enough? Let’s talk about your organization’s current level of data protection to determine if your any of your organization’s critical data is at risk: Are you 100% confident that all critical data assets are fully protected and secure today? This could include sources for which you have no protection, or less protection than you would like (e.g. too slow recovery times). If the answer is yes, can you provide some detail? If the answer is no, let’s move to question #2… Does your existing data protection give you a single transparent view of your protection levels across all your corporate data sources? This includes physical and virtual machines, Docker containers, databases, applications, mobile endpoints – both BYOD and corporate owned, SaaS sources like Office 365, and PaaS like Amazon Web Services. If the answer is no, then how can you be sure you don’t have any gaps in your data protection somewhere in your organization? Does your existing data protection allow you to adapt quickly and easily protect new platforms and applications? Or do you need to find new point solutions to protect those sources, leaving them unprotected in the meantime (which could be weeks, months or years)? Discuss the answer… Is your existing data protection complex? In particular, do your IT admins need to learn how to use different tools to protect different data sources? If so, have they developed deep expertise in all those tools needed to successfully recover any critical data under pressure? Or do you have IT admins that specialize in recovering various data sources? If you specialize, what do you do if you need to recover while your expert is on vacation or sick? Does your existing data protection solution keep you compliant with regulations like HIPAA, HITECH, and SOX? If yes, do you have that in writing? Many data protection solutions don’t because the vendors aren’t the ones who are going to face the stiff penalties – that would be you… This is especially applicable if you are in a highly regulated industry like healthcare or finance. 3 Our Solution Eliminates the Risk Comprehensive coverage Enterprise-class protection of all data on all sources Easily protect new data sources as they are added Easily customize the protection levels of each data source Single pane of glass administration Organization wide view of your data sources and protection status Full control to set and adjust the protection on any data source 100% Recovery assurance Self validation and healing to ensure your backups are recoverable Secure NIST FIPS 140-2 certified encryption in transit and at rest is HIPAA HITECH and SOX compliant Geo-location and remote data wipe of mobile endpoints Agentless means no open ports that can be compromised 4 If you face any of the data protection risks discussed on the previous slide, then a great way to fix that problem is to upgrade to our solution powered by Asigra Cloud Backup. Asigra’s data protection platform provides: Comprehensive, enterprise-class coverage for 100% of your corporate data sources – be it on physical machines, virtual servers, Docker containers, mobile endpoints beyond the firewall, SaaS sources like Office 365, Salesforce.com, or Google Apps, or PaaS like Amazon Web Services or Microsoft Azure. Moreover, because Asigra protects all data sources, any new data sources that your organization adds can easily be protected right away. Note that although Asigra is one solution, it does not force one-size-fits-all protection on all your data sources. Instead, you can easily customize the level of protection to meet your business needs on a data source by data source basis. Single pane of glass administration lets your see your protection status for all of your organization’s protected data sources in real time from a single dashboard, making it easy to identify any issues. Any protection issues can be corrected (again, customized to your business need on a data source by data source basis) using the same administration tool. 100% Recovery assurance to ensure that your data can actually be recovered when you need it. If, for whatever reason, your backup data becomes corrupted, Asigra’s self validation capability will detect the problem and automatically fix it (or alert you to the problem if it can’t be fixed), ensuring you have no nasty surprises if you ever need to recover your data. Secure data protection that meets the most stringent government regulations governing handling of sensitive data. In addition, for data on mobile endpoints like smartphones, Asigra does more than just back up the data but also gives you an easy way to erase that data from lost or stolen devices, providing you with an additional layer of data security. 4 Adoption is Easy Doesn’t need to be ‘all or nothing’ Our data protection solution, powered by Asigra, Oracle, Dell, Coresite, and Telx can be used to complement your existing data protection system. A common data protection upgrade approach is to start with data sources that are currently unprotected or that you are concerned about. As natural opportunities arise, you can move additional data sources under the protection of our solution, implement infrastructure replication, and leverage flexible tiered protection and archiving options. 5 One of the great strengths of our solution powered by Asigra is that you can start taking advantage of it in your organization without having to ‘rip-and-replace’ your legacy data protection solution(s). We can customize a solution that fits your data management requirements/needs. One common adoption approach is that an organization will start using our solution to protect data sources that are currently unprotected or that they are concerned about (e.g. because the current legacy solution is inadequate, too complex or expensive, etc.). Then, as natural opportunities arise (e.g. systems are replaced, contracts expire, etc), they will move additional data sources under the protection of our solution. 5 Comprehensive Reliable Data Protection All data sources. All platforms. 6 VMware XenServer Hyper-V MS SharePoint MS Exchange MS Outlook MS SQL Server SAP Oracle DB2 PostgreSQL Sybase Lotus Notes Lotus Domino GroupWise MySQL Windows Docker containers Linux Novell Netware Mac OSX System i Apple iOS Android Google Apps Salesforce.com MS Office 365 NetApp NAS Pause here and use this slide to ask the customer about their needs. Are there any data sources or types of data sources that they are especially concerned about and might want to start protecting first? For example, perhaps they are concerned their current data protection strategy doesn’t provide adequate coverage for virtual machines (or is too expensive). Reassure them that your solution powered by Asigra gives them the power to protect that data easily, immediately, regardless of platform, and in a way that lets them align the level of protection to the value of that data to their organization. Again stress All-In-One Data Protection Also includes a sampling of the data sources, operating systems, hypervisors, applications, and file systems that our solution protects. With many data sources – such as hypervisors and databases, Asigra use the published APIs to perform backups. However, even where those APIs don’t exist, Asigra is able to take file level backups of virtually any data source. Use this slide to discuss the customer’s data sources to reassure them that they can be protected by Asigra Cloud Backup. 6 See and Set Protection for all Your Data. Simple. 7 With our solution powered by Asigra, you can easily see your protected data source status organization-wide and control the protection levels for those data sources on a data source by data source basis using the single-pane-of-glass administration dashboard. For example, suppose you want your Office 365 mailboxes to be backed up weekly and your web servers to be backed up nightly. No problem – you can easily establish those custom policies from the dashboard and they will be run automatically. Being able to do everything from a single tool not only helps you identify any protection failures (and take immediate steps to address if you do) but also makes it easier for your IT admins to become expert in using the dashboard to monitor and protect data. This is important because if you ever need to recover your data, you’ll want your IT admins to be able to do it quickly and correctly despite being under pressure. **Actual screen shot of customer view** 7 Flexible Cloud Architecture 8 This slide provides an architectural overview of how our solution protects your data. The cloud-based architecture of our solution powered by Asigra makes it applicable to public, private, or hybrid cloud deployments. Two key points: ■Your corporate data sources, both inside and outside your firewall, are automatically and agentlessly backed up according to rules you define ■Each backup data set is encrypted, compressed, and de-duped before being sent to a secure data center of your choice off in the cloud (usually that data center is located remotely for disaster recovery purposes, but it could just as easily be your own on-site or off-site private or hybrid cloud) Point out that the DS-Client resides on our Appliance in diagram.(small blue box) 8 9 KEY STAT: Asigra’s winning performance was the model of consistency, with only 0.39 points separating its best and worst marks. Received the highest percentage of positive responses (82 percent) to the subjective question: Would You Buy This Product Again? *TechTarget 2015 Quality Awarded for enterprise backup Industry Leading Software Enterprise backup applications: Overall rankings* When you look at where Asigra ranks among other vendors, it is consistently at the top and is recognized as a leader in the data backup and recovery industry. TORONTO – July 9, 2015 - Asigra Inc., a leading cloud backup, recovery and restore software provider since 1986, today announced that TechTarget has awarded it The 2015 Quality Award for enterprise backup. For the second year in a row, Asigra is the choice of storage professionals, who prefer it over offerings from Commvault, EMC, HP, IBM and Symantec. 346 respondents provided 774 product evaluations in TechTarget’s 2015 review of enterprise and midrange backup solutions. Not only did Asigra top the enterprise section in all five categories — 1)Salesforce Competence; 2)Initial Product Quality; 3)Product Features; and 4)Reliability — it also received the highest percentage of positive responses (82 percent) to the subjective question: Would You Buy This Product Again? Additionally Asigra is recognized as a Gartner Cool Vendor and has been included in the Gartner Magic Quadrant for Enterprise Back up and Recovery Software since 2010. 9 10 How it Works Our Onsite Appliance reaches out across your network to protect all data sources, with no need to install agents on target systems. This appliance is designed to meet your specific requirements with no impact to your infrastructure. Local backups allow data to be restored rapidly over the LAN without being bottlenecked by your WAN connection. All data can be replicated to our geographically separated datacenters for increased protection and disaster recovery planning. Prior to transmission, data is compressed and encrypted, for minimal impact to your network and optimal security. All replicated data is subject to additional compression and deduplication to further reduce the size of your protected data (including iterative backups to meet retention policies), speeding up restore times and lowering data usage requirements. Our data protection plans cover your specific needs, including tiered pricing for “young” data (high value business continuity data with shortest possible RTO requirement) and “old” data (less valuable, lower priority data with lower RTO requirement). Our services also include virtualized hosting of critical applications onsite on our appliance or offsite in the cloud to satisfy Disaster Recovery and Business Continuity requirements, culminating in full offsite replication of your infrastructure. Once implemented, all solutions include proactive monitoring and on-call support, with additional SLA options available to meet the specific needs for all clients. 10 The Armada Difference Personalized Approach Data protection strategy planning based on your business requirements One-on-one personal attention: design, implementation, ongoing support Purpose Built Backup Appliance (PBBA) configured for site specific needs Specialized Services Hybrid (onsite/offsite) backup and data lifecycle management Disaster recovery and business continuity planning and implementation Datacenter resources including long-term storage, short-term application hosting, and infrastructure replication Ongoing Support and Maintenance 24/7 proactive monitoring and maintenance Scheduled reviews of systems and configuration Automated system updates All-in-One Solution People: Asigra trained engineers, experts in data protection strategies Platform: Asigra, Sun/Oracle, Coresite, Telx, Dell, Brocade Result: Reliable, Secure and Comprehensive Solution 11 Armada's key differentiator is it's attention to customer needs and servicing them fully with a consultative approach. It starts with understanding the specific needs of our clients and configuring a plan that fits. We assist with the initial implementation and continually monitor and support their data protection and recovery needs with live support and trouble shooting. Why we offer PBBA: on-site backup for quicker recovery and added flexibility. Partnerships with leading vendors provide a secure and reliable solution that let’s us focus on serving client’s needs. 11 Featured Armada Customers 12 Sampling of customer base includes: Healthcare / Law / Digital Media / Architecture / Education A proven track record with our clients gives reassurance that we can meet the necessary requirements to satisfy any compliance regulations, security concerns, and other considerations an organization might have. 12 Next Steps Questions / Comments Schedule Online Demonstration Request a Quote Contact Information: David Foster 858-433-9559
[email protected] www.armadacloud.com 13 In Conclusion: Utilizing our solution powered by Asigra, organizations benefit from an industrial-strength, award-winning, agentless data protection platform that is trusted by Fortune 500 companies around the world to protect their data, while providing 100% recovery assurance, lower costs and peace of mind which will address any gaps existing with your data protection measures today. 13