SlideShare a Scribd company logo
1 of 27
Download to read offline
XO Managed Backup
      Enterprise-Class Data Protection

      March 25, 2009


      Simon Xu- Sales Consultant
      admin@zhexu.cnc.net




© Copyright 2009 XO Concentric. All Rights Reserved
Agenda

           Why You Should Care
           Market Background
           Service Overview
           Benefits
           Operation & Architecture
           Security
           Pricing
           For More Information




                                                      1
© Copyright 2009 XO Concentric. All Rights Reserved
Why You Should Care!



                 Solves critical data protection problem
                 Reduces costs
                 Lowers risk
                 Helps meet compliance and regulatory
                 requirements




                                                      2
© Copyright 2009 XO Concentric. All Rights Reserved
Market Background




                                                      3
© Copyright 2009 XO Concentric. All Rights Reserved
Impact of Inadequate Data Protection

        Cost of data loss
        Cost of downtime
        Employee productivity
        Customer service sacrificed (lost customers)
        Reputation – damage to brand
        Recovery deadlines missed
        IT staff time consumed (quality of life/operating efficiency)
        Liabilities and legal action
        Missed projects
        Loss of business
        Policy sacrificed


                                                      4
© Copyright 2009 XO Concentric. All Rights Reserved
Service Overview




                                                      5
© Copyright 2009 XO Concentric. All Rights Reserved
Introducing XO Managed Backup:


        A reliable, secure and cost-effective solution to data backup for
        Small and Medium Sized Businesses and enterprise branch
        offices

        Protects business-critical data on servers, desktops and
        notebooks — in central and remote offices

        Scales from a few gigabytes to multiple terabytes




                                                      6
© Copyright 2009 XO Concentric. All Rights Reserved
Service Overview




                                                         Restore




   Data on Customer Servers,                          Secure Data Transfer        Backup Data Vaults
   Desktops, Notebooks and                            Via internet Connectivity   In XO Facilities
   Enterprise Applications




                                                                    7
© Copyright 2009 XO Concentric. All Rights Reserved
Service Highlights

        Online, disk-to-disk backup
                 Leverages XO connectivity
                 Reduces backup costs and inconvenience
        24 x 7 protection and accessibility
                 Backups run automatically
                 Fast, point-and-click restores
        Scalability
                 Efficiently accommodates data growth
                 Patented compression and incremental backups save time and reduce costs
        Security and compliance
                 Strong end-to-end encryption with no “back doors”
                 Satisfies regulatory requirements for security and privacy



                                                         8
© Copyright 2009 XO Concentric. All Rights Reserved
Service Highlights (cont’d)

        Ease of administration
                 Centralized, web-based control with at-a-glance status
                 Automated configuration and roles-based management
        Broad platform and applications support
                 Windows XP/Vista, Windows Server, Linux, IBM, HP, Novell, Sun, and VMware
                 Oracle, Microsoft SQL Server, Microsoft Exchange and Microsoft SharePoint
        Tailored fit
                 Custom backup and retention policies meet business requirements precisely
        Supported by pros
                 Skilled customer care and professional services teams are ready to help




                                                        9
© Copyright 2009 XO Concentric. All Rights Reserved
Value Proposition

        State-of-the-art, reliable technology
                 Encryption — six choices including 256-bit
                 Compression — averaging 2-to-1
                 Delta technology (at the block level) — further reduces the amount of data to be
                 uploaded and stored
                 Far greater recovery reliability than tape
                 Support for enterprise-grade platforms and applications
        Advantages
                 Leverage XO bandwidth – run backups during off-peak periods
                 Disaster recovery with quick return to normal operations
                 Protection: offsite (hardened) and secure (encrypted)
                 More control and better access to data (disk-to-disk vs. tape)
                 Save time and money (quicker backups, more reliable restores, less overhead)
                 Consolidated billing




                                                              10
© Copyright 2009 XO Concentric. All Rights Reserved
XO Managed Backup vs. the “Bottom Feeders”


        XO Managed Backup is a higher-end service with enterprise-
        class features

        These lower-end services cannot begin to provide the levels of
        data protection, reliability, security and flexibility offered by XO
        Managed Backup!

        It’s an apples-to-oranges comparison – including how
        gigabytes (GBs) are measured




                                                      11
© Copyright 2009 XO Concentric. All Rights Reserved
Benefits




                                                      12
© Copyright 2009 XO Concentric. All Rights Reserved
Business Benefits

        Reduced risks to business continuity and revenue loss

        Stronger disaster recovery capability

        Lowered administrative, infrastructure and operational costs

        Regulatory and statutory requirements for data retention

        Reduced downtime costs, increased employee productivity

        IT resources freed to pursue business applications




                                                      13
© Copyright 2009 XO Concentric. All Rights Reserved
Operational Benefits

        Automatic, scheduled backups

        Automatic data backup confirmation

        Immediate off-site data storage

        Easy and flexible restores

        Data protection aligned with corporate policies throughout organization

        Reduced backup time

        Virtually no need for full backups




                                                      14
© Copyright 2009 XO Concentric. All Rights Reserved
Operation & Architecture




                                                      15
© Copyright 2009 XO Concentric. All Rights Reserved
How the Service Works

        A web-based control center is used to define backup jobs and
        retention policies

        Agent software is installed on servers, desktops and notebooks

        Backup jobs are assigned to the agents

        Backup protection is then automatically maintained
                 Agents upload protected data to our backup servers
                 Data is retained according to policies set by the customer

        The control center or a desktop GUI is used to restore data




                                                        16
© Copyright 2009 XO Concentric. All Rights Reserved
Architecture


                                                                                      DESKTOP AGENT


                                                                         NOVELL NETWARE
                                                                                                            Managed Backup
                                                                                                            Vault
                                                           WINDOWS
                                                        2000/2003/2008/XP



                                                                                                                      CA
                                                                                         INTERNET
                                                      HP-UX



  Managed Backup
  Web Central Control                                         IBM AIX


                                                                        SUN SOLARIS                                   TX
                                                                               iSeries / AS 400


                                                                                             REDHAT LINUX

                                                                               Managed Backup
                                                                               Agents
                                                                                17
© Copyright 2009 XO Concentric. All Rights Reserved
Components


XO Web CentralControl                                 XO Backup Agent                XO Vault


   Administrator has complete                          First backup: Initial seed     Monitors backups
   control
                                                       Subsequent backups:            Processes, catalogs,
   of backup and recovery
                                                       Extract block level changes    indexes and stores the
   process
                                                       on each protected server       encrypted data blocks
   Features an easy-to-use GUI                         Tracks block level changes     Optimizes storage
   which allows customization                          on each protected server
                                                                                      De-duplicates data
   of policies and schedules
                                                       Compresses and encrypts
                                                                                      Optimized for disk
                                                       block changes; then pushes
   Automates the data                                                                 utilization & provides full
                                                       them to the XO Vault
   protection process                                                                 restoration of data based on
                                                                                      retention policy




                                                                      18
© Copyright 2009 XO Concentric. All Rights Reserved
Backup Process

               Managed Backup                                                                     Managed Backup
               Agents                                                                             Vault




                                                                                          INTERNET

                                    Changed Blocks           Compression    SIDF           Backup / Restore
           Changed Files
                                 Are identified from file    Encryption   Packet          Protocol ( BRTP )




      Minimizes backup windows and storage footprint
                 Delta processing only sends changed data within files (at block level)
                 Compresses data for transmission
                 Data De-duplication at the block and file level




                                                                            19
© Copyright 2009 XO Concentric. All Rights Reserved
Example Data Storage Comparison

                                                          Assumptions
                                                                          Retention Policy
                           10GB original data                           Daily:   7 copies for 7 days
                           50% compression                              Weekly: 5 copies for 31 days
                                                                        Monthly: 12 copies for 365 days
                           2% daily change rate
                                                                        TOTAL: 24 copies


           Legacy Backup Software                                XO Managed Backup
                                                                    Seed
           Full backups run daily                                      10GB 50% compressed = 5GB
                                                                    Deltas
            Totals
                                                                       2% of 10GB = 200MB
                    10GB x 24 = 240 GB
                                                                       50% compressed = 100MB
                                                                    Totals
                                                                       23 x 100MB + 5GB = 7.3 GB


                                                      240GB vs. 7.3GB
                                                                  20
© Copyright 2009 XO Concentric. All Rights Reserved
Application Security Measures

        Centralized administration and assignment of rights
                 Precise control of access privileges
        End-to-end data encryption based on the customer’s choice
                 56-bit Blowfish, 56-bit DES, 112-bit Triple-DES, 128-bit Blowfish,128-bit AES and
                 256-bit AES encryption
        Secure keys
                 The customer is the sole owner of the encryption key – even XO cannot access
                 the data
        Additional Encryption
                 XO DeltaPro is a self-encrypting process that adds an additional level of security




                                                         21
© Copyright 2009 XO Concentric. All Rights Reserved
Pricing




                                                      22
© Copyright 2009 XO Concentric. All Rights Reserved
When is a Gigabyte not a Gigabyte?

        Lower-end services quote prices for “natural” GBs
                 The data footprint on the customer’s systems
                 Fixed, pre-defined data backup and retention policies
                 OK for consumers and smaller businesses with basic requirements
        Our prices are based on “compressed” GBs
                 The data footprint on our backup servers after data is compressed, de-duplicated
                 and processed by some very elegant “delta” technology
                 Tailored, customer-defined data backup and retention policies
                 Perfect for businesses with serious data protection requirements
        A rule of thumb is that one compressed GB is equivalent to two
        natural GBs




                                                        23
© Copyright 2009 XO Concentric. All Rights Reserved
Pricing




                    Windows and Linux platform agents are provided at no charge. Advanced
                    platform agents and application plug-ins have one-time license fees.

                                                            24
© Copyright 2009 XO Concentric. All Rights Reserved
For More Information


              Questions or Comments?
                                             Feel free to discuss with me.
                                       looking forward to talking to you.
                                                       Contact: Simon Xu
                                                      admin@zhexu.cnc.net
                                                         917-770-4830




                                                                 25
© Copyright 2009 XO Concentric. All Rights Reserved
Thank You for Attending




© Copyright 2009 XO Concentric. All Rights Reserved

More Related Content

What's hot

Track 1, session 5, beat the backup blues pk gupta
Track  1, session 5, beat the backup blues pk guptaTrack  1, session 5, beat the backup blues pk gupta
Track 1, session 5, beat the backup blues pk guptaEMC Forum India
 
Data Footprint Reduction: Understanding IBM Storage Options
Data Footprint Reduction: Understanding IBM Storage OptionsData Footprint Reduction: Understanding IBM Storage Options
Data Footprint Reduction: Understanding IBM Storage OptionsTony Pearson
 
IBM Social Media Birds of a Feather v5
IBM Social Media Birds of a Feather v5IBM Social Media Birds of a Feather v5
IBM Social Media Birds of a Feather v5Tony Pearson
 
EMC isilon for -media-and-entertainment-sales-deck
EMC isilon for -media-and-entertainment-sales-deckEMC isilon for -media-and-entertainment-sales-deck
EMC isilon for -media-and-entertainment-sales-decksolarisyougood
 
IBM Storage Virtualization
IBM Storage VirtualizationIBM Storage Virtualization
IBM Storage VirtualizationIBM Danmark
 
Trusted Edge - Information Governance
Trusted Edge - Information GovernanceTrusted Edge - Information Governance
Trusted Edge - Information Governancejfxm3671
 
EMC Academic Alliance overview
EMC Academic Alliance overviewEMC Academic Alliance overview
EMC Academic Alliance overviewEMC
 
S014068 pendulum-swings-orlando-v1705c
S014068 pendulum-swings-orlando-v1705cS014068 pendulum-swings-orlando-v1705c
S014068 pendulum-swings-orlando-v1705cTony Pearson
 
S014066 scale-ess-orlando-v1705a
S014066 scale-ess-orlando-v1705aS014066 scale-ess-orlando-v1705a
S014066 scale-ess-orlando-v1705aTony Pearson
 
S104874 toe-pool-jburg-v1809e
S104874 toe-pool-jburg-v1809eS104874 toe-pool-jburg-v1809e
S104874 toe-pool-jburg-v1809eTony Pearson
 
S016394 pendulum-swings-melbourne-v1708d
S016394 pendulum-swings-melbourne-v1708dS016394 pendulum-swings-melbourne-v1708d
S016394 pendulum-swings-melbourne-v1708dTony Pearson
 
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...Tony Pearson
 
S sy0883 smarter-storage-strategy-edge2015-v4
S sy0883 smarter-storage-strategy-edge2015-v4S sy0883 smarter-storage-strategy-edge2015-v4
S sy0883 smarter-storage-strategy-edge2015-v4Tony Pearson
 
S014072 business-continuity-orlando-v1705e
S014072 business-continuity-orlando-v1705eS014072 business-continuity-orlando-v1705e
S014072 business-continuity-orlando-v1705eTony Pearson
 
VMUGIT UC 2013 - 08c Falconstor
VMUGIT UC 2013 - 08c FalconstorVMUGIT UC 2013 - 08c Falconstor
VMUGIT UC 2013 - 08c FalconstorVMUG IT
 
S014065 cloud-storage-orlando-v1705a
S014065 cloud-storage-orlando-v1705aS014065 cloud-storage-orlando-v1705a
S014065 cloud-storage-orlando-v1705aTony Pearson
 

What's hot (17)

Track 1, session 5, beat the backup blues pk gupta
Track  1, session 5, beat the backup blues pk guptaTrack  1, session 5, beat the backup blues pk gupta
Track 1, session 5, beat the backup blues pk gupta
 
Data Footprint Reduction: Understanding IBM Storage Options
Data Footprint Reduction: Understanding IBM Storage OptionsData Footprint Reduction: Understanding IBM Storage Options
Data Footprint Reduction: Understanding IBM Storage Options
 
IBM Social Media Birds of a Feather v5
IBM Social Media Birds of a Feather v5IBM Social Media Birds of a Feather v5
IBM Social Media Birds of a Feather v5
 
EMC isilon for -media-and-entertainment-sales-deck
EMC isilon for -media-and-entertainment-sales-deckEMC isilon for -media-and-entertainment-sales-deck
EMC isilon for -media-and-entertainment-sales-deck
 
IBM Storage Virtualization
IBM Storage VirtualizationIBM Storage Virtualization
IBM Storage Virtualization
 
Trusted Edge - Information Governance
Trusted Edge - Information GovernanceTrusted Edge - Information Governance
Trusted Edge - Information Governance
 
EMC Academic Alliance overview
EMC Academic Alliance overviewEMC Academic Alliance overview
EMC Academic Alliance overview
 
S014068 pendulum-swings-orlando-v1705c
S014068 pendulum-swings-orlando-v1705cS014068 pendulum-swings-orlando-v1705c
S014068 pendulum-swings-orlando-v1705c
 
S014066 scale-ess-orlando-v1705a
S014066 scale-ess-orlando-v1705aS014066 scale-ess-orlando-v1705a
S014066 scale-ess-orlando-v1705a
 
VMWare View 4
VMWare View 4VMWare View 4
VMWare View 4
 
S104874 toe-pool-jburg-v1809e
S104874 toe-pool-jburg-v1809eS104874 toe-pool-jburg-v1809e
S104874 toe-pool-jburg-v1809e
 
S016394 pendulum-swings-melbourne-v1708d
S016394 pendulum-swings-melbourne-v1708dS016394 pendulum-swings-melbourne-v1708d
S016394 pendulum-swings-melbourne-v1708d
 
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
 
S sy0883 smarter-storage-strategy-edge2015-v4
S sy0883 smarter-storage-strategy-edge2015-v4S sy0883 smarter-storage-strategy-edge2015-v4
S sy0883 smarter-storage-strategy-edge2015-v4
 
S014072 business-continuity-orlando-v1705e
S014072 business-continuity-orlando-v1705eS014072 business-continuity-orlando-v1705e
S014072 business-continuity-orlando-v1705e
 
VMUGIT UC 2013 - 08c Falconstor
VMUGIT UC 2013 - 08c FalconstorVMUGIT UC 2013 - 08c Falconstor
VMUGIT UC 2013 - 08c Falconstor
 
S014065 cloud-storage-orlando-v1705a
S014065 cloud-storage-orlando-v1705aS014065 cloud-storage-orlando-v1705a
S014065 cloud-storage-orlando-v1705a
 

Viewers also liked

200807 Flying High Presentation
200807 Flying High Presentation200807 Flying High Presentation
200807 Flying High Presentationbodymagic
 
Production Cars
Production CarsProduction Cars
Production Carsmartincodd
 
Xo Managed Backup Customer Presentation
Xo Managed Backup Customer PresentationXo Managed Backup Customer Presentation
Xo Managed Backup Customer PresentationSimonZXu
 
What is the Secret of a Successful Business Life?
What is the Secret of a Successful Business Life?What is the Secret of a Successful Business Life?
What is the Secret of a Successful Business Life?AndyatELC
 
The Washington Campus Corporate Presentation
The Washington Campus Corporate PresentationThe Washington Campus Corporate Presentation
The Washington Campus Corporate Presentationwashcampus
 

Viewers also liked (8)

200807 Flying High Presentation
200807 Flying High Presentation200807 Flying High Presentation
200807 Flying High Presentation
 
Production Cars
Production CarsProduction Cars
Production Cars
 
Personal Fabrication
Personal FabricationPersonal Fabrication
Personal Fabrication
 
Xo Managed Backup Customer Presentation
Xo Managed Backup Customer PresentationXo Managed Backup Customer Presentation
Xo Managed Backup Customer Presentation
 
UX Mobile
UX Mobile UX Mobile
UX Mobile
 
China
ChinaChina
China
 
What is the Secret of a Successful Business Life?
What is the Secret of a Successful Business Life?What is the Secret of a Successful Business Life?
What is the Secret of a Successful Business Life?
 
The Washington Campus Corporate Presentation
The Washington Campus Corporate PresentationThe Washington Campus Corporate Presentation
The Washington Campus Corporate Presentation
 

Similar to Xo Managed Backup Customer Presentation

Soyez plus flexibles avec la sauvegarde dans le cloud DPS
Soyez plus flexibles avec la sauvegarde dans le cloud DPSSoyez plus flexibles avec la sauvegarde dans le cloud DPS
Soyez plus flexibles avec la sauvegarde dans le cloud DPSRSD
 
Ibm spectrum storage protecion
Ibm spectrum storage protecion Ibm spectrum storage protecion
Ibm spectrum storage protecion Coenraad Smith
 
VMware View 4
VMware View 4VMware View 4
VMware View 4netlogix
 
3 oficinas remotas - repli stor oncourse
3 oficinas remotas - repli stor oncourse3 oficinas remotas - repli stor oncourse
3 oficinas remotas - repli stor oncourseOmega Peripherals
 
Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?Desktone
 
Symantec Backup Exec 2010 and NetBackup 7
Symantec Backup Exec 2010 and NetBackup 7Symantec Backup Exec 2010 and NetBackup 7
Symantec Backup Exec 2010 and NetBackup 7Symantec
 
Transforming Mission Critical Applications
Transforming Mission Critical ApplicationsTransforming Mission Critical Applications
Transforming Mission Critical ApplicationsCenk Ersoy
 
How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...Agora Group
 
Emc vspex customer_presentation_euc_citrix_xen_desktop5.6_2.0
Emc vspex customer_presentation_euc_citrix_xen_desktop5.6_2.0Emc vspex customer_presentation_euc_citrix_xen_desktop5.6_2.0
Emc vspex customer_presentation_euc_citrix_xen_desktop5.6_2.0xKinAnx
 
Leon IT Setup Case Study
Leon IT Setup Case StudyLeon IT Setup Case Study
Leon IT Setup Case Studyrahulmeher
 
Dr Training V1 07 17 09 Rev Four 4
 Dr Training V1 07 17 09 Rev Four 4 Dr Training V1 07 17 09 Rev Four 4
Dr Training V1 07 17 09 Rev Four 4Ricoh
 
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...Dell EMC World
 
Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...
Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...
Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...Netgear Italia
 
Many-to-One Replication for IBM ProtecTIER Deduplication Solutions
Many-to-One Replication for IBM ProtecTIER Deduplication SolutionsMany-to-One Replication for IBM ProtecTIER Deduplication Solutions
Many-to-One Replication for IBM ProtecTIER Deduplication SolutionsIBM India Smarter Computing
 

Similar to Xo Managed Backup Customer Presentation (20)

Soyez plus flexibles avec la sauvegarde dans le cloud DPS
Soyez plus flexibles avec la sauvegarde dans le cloud DPSSoyez plus flexibles avec la sauvegarde dans le cloud DPS
Soyez plus flexibles avec la sauvegarde dans le cloud DPS
 
Ibm spectrum storage protecion
Ibm spectrum storage protecion Ibm spectrum storage protecion
Ibm spectrum storage protecion
 
VMware View 4
VMware View 4VMware View 4
VMware View 4
 
3 oficinas remotas - repli stor oncourse
3 oficinas remotas - repli stor oncourse3 oficinas remotas - repli stor oncourse
3 oficinas remotas - repli stor oncourse
 
Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?
 
Ronnie Oomen (EMC)
Ronnie Oomen (EMC)Ronnie Oomen (EMC)
Ronnie Oomen (EMC)
 
Ibm spectrum protect
Ibm spectrum protect Ibm spectrum protect
Ibm spectrum protect
 
Succor's MyMedCloud& MyMedBackup
Succor's MyMedCloud& MyMedBackupSuccor's MyMedCloud& MyMedBackup
Succor's MyMedCloud& MyMedBackup
 
Symantec Backup Exec 2010 and NetBackup 7
Symantec Backup Exec 2010 and NetBackup 7Symantec Backup Exec 2010 and NetBackup 7
Symantec Backup Exec 2010 and NetBackup 7
 
Transforming Mission Critical Applications
Transforming Mission Critical ApplicationsTransforming Mission Critical Applications
Transforming Mission Critical Applications
 
How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...
 
Emc data domain
Emc data domainEmc data domain
Emc data domain
 
Emc vspex customer_presentation_euc_citrix_xen_desktop5.6_2.0
Emc vspex customer_presentation_euc_citrix_xen_desktop5.6_2.0Emc vspex customer_presentation_euc_citrix_xen_desktop5.6_2.0
Emc vspex customer_presentation_euc_citrix_xen_desktop5.6_2.0
 
Leon IT Setup Case Study
Leon IT Setup Case StudyLeon IT Setup Case Study
Leon IT Setup Case Study
 
Dr Training V1 07 17 09 Rev Four 4
 Dr Training V1 07 17 09 Rev Four 4 Dr Training V1 07 17 09 Rev Four 4
Dr Training V1 07 17 09 Rev Four 4
 
Avamar-7_2010.ppt
Avamar-7_2010.pptAvamar-7_2010.ppt
Avamar-7_2010.ppt
 
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
 
Avamar 7 2010
Avamar 7 2010Avamar 7 2010
Avamar 7 2010
 
Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...
Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...
Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...
 
Many-to-One Replication for IBM ProtecTIER Deduplication Solutions
Many-to-One Replication for IBM ProtecTIER Deduplication SolutionsMany-to-One Replication for IBM ProtecTIER Deduplication Solutions
Many-to-One Replication for IBM ProtecTIER Deduplication Solutions
 

Recently uploaded

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 

Recently uploaded (20)

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 

Xo Managed Backup Customer Presentation

  • 1. XO Managed Backup Enterprise-Class Data Protection March 25, 2009 Simon Xu- Sales Consultant admin@zhexu.cnc.net © Copyright 2009 XO Concentric. All Rights Reserved
  • 2. Agenda Why You Should Care Market Background Service Overview Benefits Operation & Architecture Security Pricing For More Information 1 © Copyright 2009 XO Concentric. All Rights Reserved
  • 3. Why You Should Care! Solves critical data protection problem Reduces costs Lowers risk Helps meet compliance and regulatory requirements 2 © Copyright 2009 XO Concentric. All Rights Reserved
  • 4. Market Background 3 © Copyright 2009 XO Concentric. All Rights Reserved
  • 5. Impact of Inadequate Data Protection Cost of data loss Cost of downtime Employee productivity Customer service sacrificed (lost customers) Reputation – damage to brand Recovery deadlines missed IT staff time consumed (quality of life/operating efficiency) Liabilities and legal action Missed projects Loss of business Policy sacrificed 4 © Copyright 2009 XO Concentric. All Rights Reserved
  • 6. Service Overview 5 © Copyright 2009 XO Concentric. All Rights Reserved
  • 7. Introducing XO Managed Backup: A reliable, secure and cost-effective solution to data backup for Small and Medium Sized Businesses and enterprise branch offices Protects business-critical data on servers, desktops and notebooks — in central and remote offices Scales from a few gigabytes to multiple terabytes 6 © Copyright 2009 XO Concentric. All Rights Reserved
  • 8. Service Overview Restore Data on Customer Servers, Secure Data Transfer Backup Data Vaults Desktops, Notebooks and Via internet Connectivity In XO Facilities Enterprise Applications 7 © Copyright 2009 XO Concentric. All Rights Reserved
  • 9. Service Highlights Online, disk-to-disk backup Leverages XO connectivity Reduces backup costs and inconvenience 24 x 7 protection and accessibility Backups run automatically Fast, point-and-click restores Scalability Efficiently accommodates data growth Patented compression and incremental backups save time and reduce costs Security and compliance Strong end-to-end encryption with no “back doors” Satisfies regulatory requirements for security and privacy 8 © Copyright 2009 XO Concentric. All Rights Reserved
  • 10. Service Highlights (cont’d) Ease of administration Centralized, web-based control with at-a-glance status Automated configuration and roles-based management Broad platform and applications support Windows XP/Vista, Windows Server, Linux, IBM, HP, Novell, Sun, and VMware Oracle, Microsoft SQL Server, Microsoft Exchange and Microsoft SharePoint Tailored fit Custom backup and retention policies meet business requirements precisely Supported by pros Skilled customer care and professional services teams are ready to help 9 © Copyright 2009 XO Concentric. All Rights Reserved
  • 11. Value Proposition State-of-the-art, reliable technology Encryption — six choices including 256-bit Compression — averaging 2-to-1 Delta technology (at the block level) — further reduces the amount of data to be uploaded and stored Far greater recovery reliability than tape Support for enterprise-grade platforms and applications Advantages Leverage XO bandwidth – run backups during off-peak periods Disaster recovery with quick return to normal operations Protection: offsite (hardened) and secure (encrypted) More control and better access to data (disk-to-disk vs. tape) Save time and money (quicker backups, more reliable restores, less overhead) Consolidated billing 10 © Copyright 2009 XO Concentric. All Rights Reserved
  • 12. XO Managed Backup vs. the “Bottom Feeders” XO Managed Backup is a higher-end service with enterprise- class features These lower-end services cannot begin to provide the levels of data protection, reliability, security and flexibility offered by XO Managed Backup! It’s an apples-to-oranges comparison – including how gigabytes (GBs) are measured 11 © Copyright 2009 XO Concentric. All Rights Reserved
  • 13. Benefits 12 © Copyright 2009 XO Concentric. All Rights Reserved
  • 14. Business Benefits Reduced risks to business continuity and revenue loss Stronger disaster recovery capability Lowered administrative, infrastructure and operational costs Regulatory and statutory requirements for data retention Reduced downtime costs, increased employee productivity IT resources freed to pursue business applications 13 © Copyright 2009 XO Concentric. All Rights Reserved
  • 15. Operational Benefits Automatic, scheduled backups Automatic data backup confirmation Immediate off-site data storage Easy and flexible restores Data protection aligned with corporate policies throughout organization Reduced backup time Virtually no need for full backups 14 © Copyright 2009 XO Concentric. All Rights Reserved
  • 16. Operation & Architecture 15 © Copyright 2009 XO Concentric. All Rights Reserved
  • 17. How the Service Works A web-based control center is used to define backup jobs and retention policies Agent software is installed on servers, desktops and notebooks Backup jobs are assigned to the agents Backup protection is then automatically maintained Agents upload protected data to our backup servers Data is retained according to policies set by the customer The control center or a desktop GUI is used to restore data 16 © Copyright 2009 XO Concentric. All Rights Reserved
  • 18. Architecture DESKTOP AGENT NOVELL NETWARE Managed Backup Vault WINDOWS 2000/2003/2008/XP CA INTERNET HP-UX Managed Backup Web Central Control IBM AIX SUN SOLARIS TX iSeries / AS 400 REDHAT LINUX Managed Backup Agents 17 © Copyright 2009 XO Concentric. All Rights Reserved
  • 19. Components XO Web CentralControl XO Backup Agent XO Vault Administrator has complete First backup: Initial seed Monitors backups control Subsequent backups: Processes, catalogs, of backup and recovery Extract block level changes indexes and stores the process on each protected server encrypted data blocks Features an easy-to-use GUI Tracks block level changes Optimizes storage which allows customization on each protected server De-duplicates data of policies and schedules Compresses and encrypts Optimized for disk block changes; then pushes Automates the data utilization & provides full them to the XO Vault protection process restoration of data based on retention policy 18 © Copyright 2009 XO Concentric. All Rights Reserved
  • 20. Backup Process Managed Backup Managed Backup Agents Vault INTERNET Changed Blocks Compression SIDF Backup / Restore Changed Files Are identified from file Encryption Packet Protocol ( BRTP ) Minimizes backup windows and storage footprint Delta processing only sends changed data within files (at block level) Compresses data for transmission Data De-duplication at the block and file level 19 © Copyright 2009 XO Concentric. All Rights Reserved
  • 21. Example Data Storage Comparison Assumptions Retention Policy 10GB original data Daily: 7 copies for 7 days 50% compression Weekly: 5 copies for 31 days Monthly: 12 copies for 365 days 2% daily change rate TOTAL: 24 copies Legacy Backup Software XO Managed Backup Seed Full backups run daily 10GB 50% compressed = 5GB Deltas Totals 2% of 10GB = 200MB 10GB x 24 = 240 GB 50% compressed = 100MB Totals 23 x 100MB + 5GB = 7.3 GB 240GB vs. 7.3GB 20 © Copyright 2009 XO Concentric. All Rights Reserved
  • 22. Application Security Measures Centralized administration and assignment of rights Precise control of access privileges End-to-end data encryption based on the customer’s choice 56-bit Blowfish, 56-bit DES, 112-bit Triple-DES, 128-bit Blowfish,128-bit AES and 256-bit AES encryption Secure keys The customer is the sole owner of the encryption key – even XO cannot access the data Additional Encryption XO DeltaPro is a self-encrypting process that adds an additional level of security 21 © Copyright 2009 XO Concentric. All Rights Reserved
  • 23. Pricing 22 © Copyright 2009 XO Concentric. All Rights Reserved
  • 24. When is a Gigabyte not a Gigabyte? Lower-end services quote prices for “natural” GBs The data footprint on the customer’s systems Fixed, pre-defined data backup and retention policies OK for consumers and smaller businesses with basic requirements Our prices are based on “compressed” GBs The data footprint on our backup servers after data is compressed, de-duplicated and processed by some very elegant “delta” technology Tailored, customer-defined data backup and retention policies Perfect for businesses with serious data protection requirements A rule of thumb is that one compressed GB is equivalent to two natural GBs 23 © Copyright 2009 XO Concentric. All Rights Reserved
  • 25. Pricing Windows and Linux platform agents are provided at no charge. Advanced platform agents and application plug-ins have one-time license fees. 24 © Copyright 2009 XO Concentric. All Rights Reserved
  • 26. For More Information Questions or Comments? Feel free to discuss with me. looking forward to talking to you. Contact: Simon Xu admin@zhexu.cnc.net 917-770-4830 25 © Copyright 2009 XO Concentric. All Rights Reserved
  • 27. Thank You for Attending © Copyright 2009 XO Concentric. All Rights Reserved