Submit Search
Upload
Xo Managed Backup Customer Presentation
•
0 likes
•
218 views
SimonZXu
Follow
Managed Backup is an automatic backup solution through internet to businesses.
Read less
Read more
Technology
Report
Share
Report
Share
1 of 27
Download now
Download to read offline
Recommended
Avamar weekly webcast
Avamar weekly webcast
stefriche0199
Microsoft+ +bc-dr+-+28apr2010
Microsoft+ +bc-dr+-+28apr2010
Agora Group
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
1CloudRoad.com
Cloud Back Up and Disaster Recovery
Cloud Back Up and Disaster Recovery
Terell Jones
Introducing VNX Series
Introducing VNX Series
Arraya Solutions
White Paper: EMC Isilon OneFS Operating System
White Paper: EMC Isilon OneFS Operating System
EMC
Scale-Out Data Lake with EMC Isilon
Scale-Out Data Lake with EMC Isilon
EMC
Solving io bottleneck
Solving io bottleneck
Anil Vasudeva
Recommended
Avamar weekly webcast
Avamar weekly webcast
stefriche0199
Microsoft+ +bc-dr+-+28apr2010
Microsoft+ +bc-dr+-+28apr2010
Agora Group
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
1CloudRoad.com
Cloud Back Up and Disaster Recovery
Cloud Back Up and Disaster Recovery
Terell Jones
Introducing VNX Series
Introducing VNX Series
Arraya Solutions
White Paper: EMC Isilon OneFS Operating System
White Paper: EMC Isilon OneFS Operating System
EMC
Scale-Out Data Lake with EMC Isilon
Scale-Out Data Lake with EMC Isilon
EMC
Solving io bottleneck
Solving io bottleneck
Anil Vasudeva
Track 1, session 5, beat the backup blues pk gupta
Track 1, session 5, beat the backup blues pk gupta
EMC Forum India
Data Footprint Reduction: Understanding IBM Storage Options
Data Footprint Reduction: Understanding IBM Storage Options
Tony Pearson
IBM Social Media Birds of a Feather v5
IBM Social Media Birds of a Feather v5
Tony Pearson
EMC isilon for -media-and-entertainment-sales-deck
EMC isilon for -media-and-entertainment-sales-deck
solarisyougood
IBM Storage Virtualization
IBM Storage Virtualization
IBM Danmark
Trusted Edge - Information Governance
Trusted Edge - Information Governance
jfxm3671
EMC Academic Alliance overview
EMC Academic Alliance overview
EMC
S014068 pendulum-swings-orlando-v1705c
S014068 pendulum-swings-orlando-v1705c
Tony Pearson
S014066 scale-ess-orlando-v1705a
S014066 scale-ess-orlando-v1705a
Tony Pearson
VMWare View 4
VMWare View 4
dataplex systems limited
S104874 toe-pool-jburg-v1809e
S104874 toe-pool-jburg-v1809e
Tony Pearson
S016394 pendulum-swings-melbourne-v1708d
S016394 pendulum-swings-melbourne-v1708d
Tony Pearson
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Tony Pearson
S sy0883 smarter-storage-strategy-edge2015-v4
S sy0883 smarter-storage-strategy-edge2015-v4
Tony Pearson
S014072 business-continuity-orlando-v1705e
S014072 business-continuity-orlando-v1705e
Tony Pearson
VMUGIT UC 2013 - 08c Falconstor
VMUGIT UC 2013 - 08c Falconstor
VMUG IT
S014065 cloud-storage-orlando-v1705a
S014065 cloud-storage-orlando-v1705a
Tony Pearson
200807 Flying High Presentation
200807 Flying High Presentation
bodymagic
Production Cars
Production Cars
martincodd
Personal Fabrication
Personal Fabrication
Bahareh Taghavi Zavareh
Xo Managed Backup Customer Presentation
Xo Managed Backup Customer Presentation
SimonZXu
UX Mobile
UX Mobile
Bahareh Taghavi Zavareh
More Related Content
What's hot
Track 1, session 5, beat the backup blues pk gupta
Track 1, session 5, beat the backup blues pk gupta
EMC Forum India
Data Footprint Reduction: Understanding IBM Storage Options
Data Footprint Reduction: Understanding IBM Storage Options
Tony Pearson
IBM Social Media Birds of a Feather v5
IBM Social Media Birds of a Feather v5
Tony Pearson
EMC isilon for -media-and-entertainment-sales-deck
EMC isilon for -media-and-entertainment-sales-deck
solarisyougood
IBM Storage Virtualization
IBM Storage Virtualization
IBM Danmark
Trusted Edge - Information Governance
Trusted Edge - Information Governance
jfxm3671
EMC Academic Alliance overview
EMC Academic Alliance overview
EMC
S014068 pendulum-swings-orlando-v1705c
S014068 pendulum-swings-orlando-v1705c
Tony Pearson
S014066 scale-ess-orlando-v1705a
S014066 scale-ess-orlando-v1705a
Tony Pearson
VMWare View 4
VMWare View 4
dataplex systems limited
S104874 toe-pool-jburg-v1809e
S104874 toe-pool-jburg-v1809e
Tony Pearson
S016394 pendulum-swings-melbourne-v1708d
S016394 pendulum-swings-melbourne-v1708d
Tony Pearson
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Tony Pearson
S sy0883 smarter-storage-strategy-edge2015-v4
S sy0883 smarter-storage-strategy-edge2015-v4
Tony Pearson
S014072 business-continuity-orlando-v1705e
S014072 business-continuity-orlando-v1705e
Tony Pearson
VMUGIT UC 2013 - 08c Falconstor
VMUGIT UC 2013 - 08c Falconstor
VMUG IT
S014065 cloud-storage-orlando-v1705a
S014065 cloud-storage-orlando-v1705a
Tony Pearson
What's hot
(17)
Track 1, session 5, beat the backup blues pk gupta
Track 1, session 5, beat the backup blues pk gupta
Data Footprint Reduction: Understanding IBM Storage Options
Data Footprint Reduction: Understanding IBM Storage Options
IBM Social Media Birds of a Feather v5
IBM Social Media Birds of a Feather v5
EMC isilon for -media-and-entertainment-sales-deck
EMC isilon for -media-and-entertainment-sales-deck
IBM Storage Virtualization
IBM Storage Virtualization
Trusted Edge - Information Governance
Trusted Edge - Information Governance
EMC Academic Alliance overview
EMC Academic Alliance overview
S014068 pendulum-swings-orlando-v1705c
S014068 pendulum-swings-orlando-v1705c
S014066 scale-ess-orlando-v1705a
S014066 scale-ess-orlando-v1705a
VMWare View 4
VMWare View 4
S104874 toe-pool-jburg-v1809e
S104874 toe-pool-jburg-v1809e
S016394 pendulum-swings-melbourne-v1708d
S016394 pendulum-swings-melbourne-v1708d
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
S sy0883 smarter-storage-strategy-edge2015-v4
S sy0883 smarter-storage-strategy-edge2015-v4
S014072 business-continuity-orlando-v1705e
S014072 business-continuity-orlando-v1705e
VMUGIT UC 2013 - 08c Falconstor
VMUGIT UC 2013 - 08c Falconstor
S014065 cloud-storage-orlando-v1705a
S014065 cloud-storage-orlando-v1705a
Viewers also liked
200807 Flying High Presentation
200807 Flying High Presentation
bodymagic
Production Cars
Production Cars
martincodd
Personal Fabrication
Personal Fabrication
Bahareh Taghavi Zavareh
Xo Managed Backup Customer Presentation
Xo Managed Backup Customer Presentation
SimonZXu
UX Mobile
UX Mobile
Bahareh Taghavi Zavareh
China
China
pshuster
What is the Secret of a Successful Business Life?
What is the Secret of a Successful Business Life?
AndyatELC
The Washington Campus Corporate Presentation
The Washington Campus Corporate Presentation
washcampus
Viewers also liked
(8)
200807 Flying High Presentation
200807 Flying High Presentation
Production Cars
Production Cars
Personal Fabrication
Personal Fabrication
Xo Managed Backup Customer Presentation
Xo Managed Backup Customer Presentation
UX Mobile
UX Mobile
China
China
What is the Secret of a Successful Business Life?
What is the Secret of a Successful Business Life?
The Washington Campus Corporate Presentation
The Washington Campus Corporate Presentation
Similar to Xo Managed Backup Customer Presentation
Soyez plus flexibles avec la sauvegarde dans le cloud DPS
Soyez plus flexibles avec la sauvegarde dans le cloud DPS
RSD
Ibm spectrum storage protecion
Ibm spectrum storage protecion
Coenraad Smith
VMware View 4
VMware View 4
netlogix
3 oficinas remotas - repli stor oncourse
3 oficinas remotas - repli stor oncourse
Omega Peripherals
Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?
Desktone
Ronnie Oomen (EMC)
Ronnie Oomen (EMC)
Evy Van Rompay
Ibm spectrum protect
Ibm spectrum protect
Diego Rodriguez
Succor's MyMedCloud& MyMedBackup
Succor's MyMedCloud& MyMedBackup
Succor Consulting Group, Inc.
Symantec Backup Exec 2010 and NetBackup 7
Symantec Backup Exec 2010 and NetBackup 7
Symantec
Transforming Mission Critical Applications
Transforming Mission Critical Applications
Cenk Ersoy
How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...
Agora Group
Emc data domain
Emc data domain
solarisyougood
Emc vspex customer_presentation_euc_citrix_xen_desktop5.6_2.0
Emc vspex customer_presentation_euc_citrix_xen_desktop5.6_2.0
xKinAnx
Leon IT Setup Case Study
Leon IT Setup Case Study
rahulmeher
Dr Training V1 07 17 09 Rev Four 4
Dr Training V1 07 17 09 Rev Four 4
Ricoh
Avamar-7_2010.ppt
Avamar-7_2010.ppt
ssusercd74fb
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
Dell EMC World
Avamar 7 2010
Avamar 7 2010
Phani Kumar
Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...
Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...
Netgear Italia
Many-to-One Replication for IBM ProtecTIER Deduplication Solutions
Many-to-One Replication for IBM ProtecTIER Deduplication Solutions
IBM India Smarter Computing
Similar to Xo Managed Backup Customer Presentation
(20)
Soyez plus flexibles avec la sauvegarde dans le cloud DPS
Soyez plus flexibles avec la sauvegarde dans le cloud DPS
Ibm spectrum storage protecion
Ibm spectrum storage protecion
VMware View 4
VMware View 4
3 oficinas remotas - repli stor oncourse
3 oficinas remotas - repli stor oncourse
Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?
Ronnie Oomen (EMC)
Ronnie Oomen (EMC)
Ibm spectrum protect
Ibm spectrum protect
Succor's MyMedCloud& MyMedBackup
Succor's MyMedCloud& MyMedBackup
Symantec Backup Exec 2010 and NetBackup 7
Symantec Backup Exec 2010 and NetBackup 7
Transforming Mission Critical Applications
Transforming Mission Critical Applications
How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...
Emc data domain
Emc data domain
Emc vspex customer_presentation_euc_citrix_xen_desktop5.6_2.0
Emc vspex customer_presentation_euc_citrix_xen_desktop5.6_2.0
Leon IT Setup Case Study
Leon IT Setup Case Study
Dr Training V1 07 17 09 Rev Four 4
Dr Training V1 07 17 09 Rev Four 4
Avamar-7_2010.ppt
Avamar-7_2010.ppt
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
Avamar 7 2010
Avamar 7 2010
Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...
Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...
Many-to-One Replication for IBM ProtecTIER Deduplication Solutions
Many-to-One Replication for IBM ProtecTIER Deduplication Solutions
Recently uploaded
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
charlottematthew16
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
Addepto
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
Lars Bell
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
RankYa
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
null - The Open Security Community
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Zilliz
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
Alan Dix
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
comworks
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
Slibray Presentation
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
Miki Katsuragi
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Mattias Andersson
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Scott Keck-Warren
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
Rizwan Syed
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Fwdays
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
Dilum Bandara
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
Alfredo García Lavilla
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Precisely
Recently uploaded
(20)
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Xo Managed Backup Customer Presentation
1.
XO Managed Backup
Enterprise-Class Data Protection March 25, 2009 Simon Xu- Sales Consultant admin@zhexu.cnc.net © Copyright 2009 XO Concentric. All Rights Reserved
2.
Agenda
Why You Should Care Market Background Service Overview Benefits Operation & Architecture Security Pricing For More Information 1 © Copyright 2009 XO Concentric. All Rights Reserved
3.
Why You Should
Care! Solves critical data protection problem Reduces costs Lowers risk Helps meet compliance and regulatory requirements 2 © Copyright 2009 XO Concentric. All Rights Reserved
4.
Market Background
3 © Copyright 2009 XO Concentric. All Rights Reserved
5.
Impact of Inadequate
Data Protection Cost of data loss Cost of downtime Employee productivity Customer service sacrificed (lost customers) Reputation – damage to brand Recovery deadlines missed IT staff time consumed (quality of life/operating efficiency) Liabilities and legal action Missed projects Loss of business Policy sacrificed 4 © Copyright 2009 XO Concentric. All Rights Reserved
6.
Service Overview
5 © Copyright 2009 XO Concentric. All Rights Reserved
7.
Introducing XO Managed
Backup: A reliable, secure and cost-effective solution to data backup for Small and Medium Sized Businesses and enterprise branch offices Protects business-critical data on servers, desktops and notebooks — in central and remote offices Scales from a few gigabytes to multiple terabytes 6 © Copyright 2009 XO Concentric. All Rights Reserved
8.
Service Overview
Restore Data on Customer Servers, Secure Data Transfer Backup Data Vaults Desktops, Notebooks and Via internet Connectivity In XO Facilities Enterprise Applications 7 © Copyright 2009 XO Concentric. All Rights Reserved
9.
Service Highlights
Online, disk-to-disk backup Leverages XO connectivity Reduces backup costs and inconvenience 24 x 7 protection and accessibility Backups run automatically Fast, point-and-click restores Scalability Efficiently accommodates data growth Patented compression and incremental backups save time and reduce costs Security and compliance Strong end-to-end encryption with no “back doors” Satisfies regulatory requirements for security and privacy 8 © Copyright 2009 XO Concentric. All Rights Reserved
10.
Service Highlights (cont’d)
Ease of administration Centralized, web-based control with at-a-glance status Automated configuration and roles-based management Broad platform and applications support Windows XP/Vista, Windows Server, Linux, IBM, HP, Novell, Sun, and VMware Oracle, Microsoft SQL Server, Microsoft Exchange and Microsoft SharePoint Tailored fit Custom backup and retention policies meet business requirements precisely Supported by pros Skilled customer care and professional services teams are ready to help 9 © Copyright 2009 XO Concentric. All Rights Reserved
11.
Value Proposition
State-of-the-art, reliable technology Encryption — six choices including 256-bit Compression — averaging 2-to-1 Delta technology (at the block level) — further reduces the amount of data to be uploaded and stored Far greater recovery reliability than tape Support for enterprise-grade platforms and applications Advantages Leverage XO bandwidth – run backups during off-peak periods Disaster recovery with quick return to normal operations Protection: offsite (hardened) and secure (encrypted) More control and better access to data (disk-to-disk vs. tape) Save time and money (quicker backups, more reliable restores, less overhead) Consolidated billing 10 © Copyright 2009 XO Concentric. All Rights Reserved
12.
XO Managed Backup
vs. the “Bottom Feeders” XO Managed Backup is a higher-end service with enterprise- class features These lower-end services cannot begin to provide the levels of data protection, reliability, security and flexibility offered by XO Managed Backup! It’s an apples-to-oranges comparison – including how gigabytes (GBs) are measured 11 © Copyright 2009 XO Concentric. All Rights Reserved
13.
Benefits
12 © Copyright 2009 XO Concentric. All Rights Reserved
14.
Business Benefits
Reduced risks to business continuity and revenue loss Stronger disaster recovery capability Lowered administrative, infrastructure and operational costs Regulatory and statutory requirements for data retention Reduced downtime costs, increased employee productivity IT resources freed to pursue business applications 13 © Copyright 2009 XO Concentric. All Rights Reserved
15.
Operational Benefits
Automatic, scheduled backups Automatic data backup confirmation Immediate off-site data storage Easy and flexible restores Data protection aligned with corporate policies throughout organization Reduced backup time Virtually no need for full backups 14 © Copyright 2009 XO Concentric. All Rights Reserved
16.
Operation & Architecture
15 © Copyright 2009 XO Concentric. All Rights Reserved
17.
How the Service
Works A web-based control center is used to define backup jobs and retention policies Agent software is installed on servers, desktops and notebooks Backup jobs are assigned to the agents Backup protection is then automatically maintained Agents upload protected data to our backup servers Data is retained according to policies set by the customer The control center or a desktop GUI is used to restore data 16 © Copyright 2009 XO Concentric. All Rights Reserved
18.
Architecture
DESKTOP AGENT NOVELL NETWARE Managed Backup Vault WINDOWS 2000/2003/2008/XP CA INTERNET HP-UX Managed Backup Web Central Control IBM AIX SUN SOLARIS TX iSeries / AS 400 REDHAT LINUX Managed Backup Agents 17 © Copyright 2009 XO Concentric. All Rights Reserved
19.
Components XO Web CentralControl
XO Backup Agent XO Vault Administrator has complete First backup: Initial seed Monitors backups control Subsequent backups: Processes, catalogs, of backup and recovery Extract block level changes indexes and stores the process on each protected server encrypted data blocks Features an easy-to-use GUI Tracks block level changes Optimizes storage which allows customization on each protected server De-duplicates data of policies and schedules Compresses and encrypts Optimized for disk block changes; then pushes Automates the data utilization & provides full them to the XO Vault protection process restoration of data based on retention policy 18 © Copyright 2009 XO Concentric. All Rights Reserved
20.
Backup Process
Managed Backup Managed Backup Agents Vault INTERNET Changed Blocks Compression SIDF Backup / Restore Changed Files Are identified from file Encryption Packet Protocol ( BRTP ) Minimizes backup windows and storage footprint Delta processing only sends changed data within files (at block level) Compresses data for transmission Data De-duplication at the block and file level 19 © Copyright 2009 XO Concentric. All Rights Reserved
21.
Example Data Storage
Comparison Assumptions Retention Policy 10GB original data Daily: 7 copies for 7 days 50% compression Weekly: 5 copies for 31 days Monthly: 12 copies for 365 days 2% daily change rate TOTAL: 24 copies Legacy Backup Software XO Managed Backup Seed Full backups run daily 10GB 50% compressed = 5GB Deltas Totals 2% of 10GB = 200MB 10GB x 24 = 240 GB 50% compressed = 100MB Totals 23 x 100MB + 5GB = 7.3 GB 240GB vs. 7.3GB 20 © Copyright 2009 XO Concentric. All Rights Reserved
22.
Application Security Measures
Centralized administration and assignment of rights Precise control of access privileges End-to-end data encryption based on the customer’s choice 56-bit Blowfish, 56-bit DES, 112-bit Triple-DES, 128-bit Blowfish,128-bit AES and 256-bit AES encryption Secure keys The customer is the sole owner of the encryption key – even XO cannot access the data Additional Encryption XO DeltaPro is a self-encrypting process that adds an additional level of security 21 © Copyright 2009 XO Concentric. All Rights Reserved
23.
Pricing
22 © Copyright 2009 XO Concentric. All Rights Reserved
24.
When is a
Gigabyte not a Gigabyte? Lower-end services quote prices for “natural” GBs The data footprint on the customer’s systems Fixed, pre-defined data backup and retention policies OK for consumers and smaller businesses with basic requirements Our prices are based on “compressed” GBs The data footprint on our backup servers after data is compressed, de-duplicated and processed by some very elegant “delta” technology Tailored, customer-defined data backup and retention policies Perfect for businesses with serious data protection requirements A rule of thumb is that one compressed GB is equivalent to two natural GBs 23 © Copyright 2009 XO Concentric. All Rights Reserved
25.
Pricing
Windows and Linux platform agents are provided at no charge. Advanced platform agents and application plug-ins have one-time license fees. 24 © Copyright 2009 XO Concentric. All Rights Reserved
26.
For More Information
Questions or Comments? Feel free to discuss with me. looking forward to talking to you. Contact: Simon Xu admin@zhexu.cnc.net 917-770-4830 25 © Copyright 2009 XO Concentric. All Rights Reserved
27.
Thank You for Attending © Copyright 2009
XO Concentric. All Rights Reserved
Download now