Disaster Recovery and Business Continuity

Is your business prepared for disaster?

Small and midsized business are among the highest risk groups for catastrophic data loss.

The U.S. National Cyber Security Alliance found that 60 percent of small companies are unable to sustain their businesses over six months after a cyber-attack.
– The Denver Post

Regrettably, data loss occurs far too often. Drives fail, and backups could miss an important document. However, when a critical number of files are lost, or destroyed, catastrophe can strike unexpectedly. With the help of our automatic online backup and targeted recovery services, your business can avoid this misfortune.

Exceed data protection services are a complete set of business continuity tools, designed to meet the need of your company.

– Business continuity design
– Disaster recovery planning
– Secure remote backup
– Perimeter security
– Email protection and archiving
– Hardware and software monitoring
– Restore business services quickly

Secure off-site storage with at least 128-bit encryption during transit. Frequent automated backup jobs allow the capture of new and changed files. Recovery of virtually all data is possible following a disaster.

Small to midsized businesses need redundancy, but not at the cost of enterprise-level solutions with multiple redundant data centers. However, with backup replication to offsite storage and the ability to restart your environment as a virtual image on Exceed data services, you are protected. Traditional business continuity solutions have required weeks to rebuild and reinstall critical software, hardware, and data. Exceed data services can reduce the downtime days or even hours.

Avoiding downtime is an equally significant portion of any business continuity package. Protection of email services and backup of mailboxes assures consistent access during times of crisis.

Adding a layered approach to security through advanced threat detection and next-generation firewall products help to further your full-service protection.

Exceed data protection services are built and configured to meet your business needs – from desktop to server, and from mobile platforms to cloud services. With backup solutions for
– Windows Server (2000 and newer)
– Windows desktops (XP and newer)
– Linux (Red Hat, CentOS, and Ubuntu)
– Virtual machines (VMware, Hyper-V, and several others)
– Physical servers and desktops

Fire, natural disaster, security flaws, viruses, other malware, or even human error, can interrupt your business operations. Maintaining a healthy, resilient, network, requires a well designed and properly implemented solution.

Part of the development of your business continuity plan should include:

Determining the recovery time objective (RTO), or the maximum reasonable amount of time that your applications can be offline.

A recovery point objective (RPO) is the maximum allowable length of time between snapshots of your data. This period varies based on the nature of your data. Your business critical information would typically require more frequent images, while slow moving archival data would not require backups as often. Note that data sizing is not the purpose of RTO and RPO.

The key point behind RTO and RPO calculation is to balance downtime, the complexity of recovery operations, storage footprints, and overall cost to meet your business continuity requirements.

Designing your disaster recovery plan according to your recovery goals, from minor mistakes to catastrophes, requires:
– clear definition of tasks
– implementation of controls and secure access
– up to date software and hardware licensing
– regular maintenance and patch management
– setting realistic goals and expectations
– setting realistic recovery paths for your systems
– understanding the bearing your design has on operations
– regular testing of the parts, as well as the whole

Contact us to discuss pricing for online backup and recovery pricing, and let’s begin your business continuity discussion today.