Hi [[ session.user.profile.firstName ]]

Microsoft Azure for Disaster Recovery in Education

Fires. Storms. Floods. Attacks. When you think of disasters, you may think of the headlines in the news and the pictures of communities recovering from misfortune. But think for a moment of how much your school depends on its technology and how much smoother the return to normalcy could be after a disaster if you had the peace of mind that your school's data was protected, backed-up and recoverable. That's one less worry.

Join us for Microsoft Azure for Disaster Recovery in Education to learn how to have a strong disaster recovery solution in place in case the worst-case scenario happens. Learn how Microsoft Azure can help you eliminate the need for investment in expensive backup datacenter or hosting-based disaster recovery solutions.

This session will cover how you can:
•Lower traditional cost of operating: roughly 50% cost reduction over most on-premises disaster recovery
•Gain peace of mind: Reliable, offsite, & potentially geo-replicated backup storage
•Benefit from increased uptime: 99.9% availability guaranteed Fast, automatic, testable backups

Plus, learn more about how a disaster recovery plan and assessment by SADA Systems, a Microsoft U.S. Education Cloud Productivity Partner of the Year ensures that your organization is prepared for the unexpected before it’s too late.
Recorded Jan 18 2016 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sheela Varadhan, Microsoft; Chris Irwin, SADA Systems
Presentation preview: Microsoft Azure for Disaster Recovery in Education

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Don't Be the Next Big Headline - Proactive Steps and BCDR Planning Nov 17 2016 6:00 pm UTC 45 mins
    Brenda Piazza, Director of Cybersecurity Management at CBIZ MHM, LLC
    In light of recent data breaches and the increasing cost of a breach, it is clear why good IT and cybersecurity management is key to your business, especially when it comes to Business Continuity and Disaster Recovery planning. Join this presentation and learn about the human error in breaches, as well as what managers should know about their IT environment. Learn the steps you need to take today to ensure the right BCDR plans are in place before a disaster strikes.
  • Virtualization: The Key to Approachable Disaster Recovery Recorded: Oct 19 2016 58 mins
    Jim Hannan, Principal Architect & Chris Vacanti, Senior Consultant, House of Brick Technologies
    Come prepared to look at disaster recovery planning with a 360 degree view for the enterprise and SMB space, and walk away with technical ideas you can begin to implement immediately. During this presentation, we will discuss disaster recovery planning considerations and partnerships. We will also walk through technical solutions that provide a way to use virtualization and storage strategies for an approachable DR solution.
  • Protect Your Applications and Data with Fault Tolerant Software Recorded: Aug 18 2016 27 mins
    James Chillingworth, Founder (CEO), The Consulting Practice Inc.
    Learn how your organization can achieve better data protection through leveraging fault-tolerant technology. Cybersecurity expert James Chillingworth will review how applying hardware architecture concepts, in addition to other abstractions can form the framework for developing software that becomes more robust, reliable, expandable and secure. By implementing this, organizations can better protect their applications, data, databases, and improve security, operability, code quality and redundancy.
  • Ransomware Realities for Healthcare: Cloud Backup and Security Answers Recorded: Aug 18 2016 49 mins
    Tim Vogel, Co-Founder and CEO, Xtium & Kevin Lancaster, CEO ID Agent
    With the healthcare industry experiencing a dramatic increase in the volume of successful ransomware attacks, it is critical that organizations upgrade their security policies and approach.

    This means understanding the evolving cyberattack landscape and developing effective strategies to protect the integrity of systems, applications, and data. A critical aspect of that strategy is proactively identifying employee email credentials that have been compromised. In our 2016 benchmark study of healthcare firms, Xtium and ID Agent recently found that 65% of firms analyzed have employees with visibly compromised accounts. These findings illustrate the need for ongoing monitoring as well as 100% reliable and responsive business continuity solutions.

    The urgency stems from the fact that stolen health records are worth more than 10 times the value of stolen credit card numbers. The FBI recommends combating these cyber-threats by establishing a solid business continuity plan which includes the regular creation of secure, isolated data backups. 

    This presentation will a) explore the common misperceptions and security holes that can lead to ransomware vulnerability, b) discuss the study results and the measurable ongoing threat represented by compromised email accounts, c) compare the various alternatives for responding to cyberattacks, d) explain the pros and cons of cloud-based security and backup strategies, and e) provide real-world case study examples of how recent ransomware attacks have been quickly and successfully resolved.
  • Redefinition of Business Continuity Strategies using Cloud Native Enterprise Arc Recorded: Aug 18 2016 49 mins
    Frank Stienhans, CTO at Ocean9
    Both production and non-production landscapes are massively effected by the rewritten laws of physics in the cloud.

    One opportunity of Cloud Native Enterprise Architectures is to redefine the approaches to Business Continuity and Disaster Recovery.

    Using SAP workloads on AWS as example we will show how and why enterprises run different than before and how Disaster Recovery needs accelerate all in migrations to the cloud.
  • Monitor with Discipline – Protect Your Data Protocol Recorded: Aug 18 2016 36 mins
    Kong Yang, Head Geek of Virtualization & Cloud Practice, SolarWinds
    Data is the new currency. It is the gold waiting to be mined, the oil waiting to be refined, and the resource waiting to be taken for ransom or stolen for its intellectual property. Wait, that last piece didn’t rhyme. And that lack of rhythm and rhyme is why data recovery is evolving from naturally occurring events i.e. system failures and natural disasters to unleashed beasts such as social-engineered phishing attacks and schemes designed to take your data hostage.
    In this session, we’ll discuss how to monitor with discipline in order to protect your data protocol with effective and efficient process management.
    · What is monitoring with discipline?
    · How do I optimize my backup and recovery process?
    · How can I extend my current data recovery protocol to encompass ransomware protection?
  • Aligning IT Disaster Recovery with Business Requirements Recorded: Aug 17 2016 42 mins
    Dustin Mackie, Managing Consultant at Avalution Consulting
    Although most organizations have been performing elements of IT disaster recovery for years to decades, it’s still common for organizations to struggle to ensure alignment between IT capabilities and business application recovery needs. Even if IT exercises run flawlessly and meet planned recovery capabilities, there often remains gaps between the business requests and IT committed capabilities. This can inhibit organizations from having effective (yet reasonable) strategies in place that meet all stakeholder expectations.

    This presentation will explore potential methods organizations can execute to help all groups in the disaster recovery process understand each other’s intent, priorities, dependencies, needs, and considerations, as well as the impacts of system downtime. These methods seek to truly synchronize business continuity and IT disaster recovery by enabling ongoing discussion, understanding and insight, continued coordination, and communication. Taking such measures will ensure an effective IT disaster recovery program that meets the expectations of all stakeholders.
  • Data Protection in the Era of Hyperconvergence Recorded: Aug 17 2016 61 mins
    Jim Whalen, Taneja Group; Patrick Rogers, Cohesity; Jesse St Laurent, SimpliVity; Joe Noonan, Unitrends; Rick Vanover, Veeam
    Hyperconvergence is a rapidly growing and evolving force in the IT infrastructure space. Emerging from the factory pre-configured racking programs of the big IT equipment suppliers, it quickly morphed into a variety of VM-centric architectures where compute, storage and networking (and more) are all integrated below the hypervisor and provide a unified platform to run virtual workloads on. The questions surrounding Data Protection are many: Is a DP mechanism even needed in a distributed cluster architecture that hyperconverged platforms typically drive? What’s the role of traditional backup software and appliances? Is physical server backup still important? What’s the optimum solution for backing up a hyperconverged platform? Is there an optimum solution?

    In this presentation, some of today’s leading vendors will give their take on what the intersection of Hyperconvergence and Data Protection means for the end user.

    * Cohesity - Patrick Rogers, VP Marketing & Product Management
    * SimpliVity - Jesse St Laurent, VP of Product Strategy
    * Unitrends - Joe Noonan, Director, Software Product Management
    * Veeam - Rick Vanover, Director of Technical Product Marketing
  • Database Backup and Recovery Best Practices Recorded: Aug 10 2016 31 mins
    Manjot Singh, Data & Infrastructure Architect at Percona
    In the case of a failure, do you know how long it will take to restore your database? Do you know how old the backup will be? In this presentation, we will cover the basics of best practices for backup, restoration and business continuity. Don’t put your company on the line due to bad data retention and backup policies.
  • Windows 10: Digital Transformation through Affordable Innovation Recorded: Jun 16 2016 17 mins
    Peter Gossin, Digital Transformation Manager, Microsoft
    Digital transformation is the process of using today’s technology to modernize outdated processes and meet the most pressing needs of your business.

    Thanks to recent advances in lower cost tablet technology and Microsoft’s suite of cloud and productivity services, complete digital transformation is more accessible now than ever before. A new class of affordable devices is revolutionizing the way businesses and their employees work and interact with customers.

    Sign up now to:
    •Engage your customers
    •Empower your employees
    •Optimize your operations
    •Transform your products
  • IT Security: Incident Planning and Response Recorded: Jun 16 2016 59 mins
    Mark Essayian, Microsoft
    It’s critical to know what is going on inside your network, what technology is being snuck into your firm, and how to educate employees about security precautions. IT management has a clear responsibility to protect, defend and remain vigilant over all systems and it doesn’t stop at antivirus on the desktop and a firewall to the Internet.

    Join this webcast to learn:
    •Why SMB’s are a prime target
    •How to help prevent your employees from being your biggest security threat
    •Proper asset inventory – you cannot protect what you do not know about
    •Protection and planning to prevent and/or mitigate a breach
  • Managing Vendor Resiliency Through Audits and Contract Management Recorded: May 19 2016 43 mins
    Melinda Rahe, Business Continuity Program Manager Dell, Inc.
    Outsourcing shifts the burden to mitigate risk to the vendor. But, it does not shift the impact of the risk. Your company’s reputation and its’ customers can be negatively impacted when your vendor experiences failure.
    This presentation discusses how to formulate a vendor resiliency strategy. And, will equip participants with practical solutions for effectively, as well as efficiently, assessing the business continuity risk exposures introduced by outsourcing business functions
  • Playing a Dangerous DR Game? Take Your DR and Backup Plan to the Next Level Recorded: May 18 2016 54 mins
    Lilac Schoenbeck, VP of Product Management & Marketing and Dante Orsini, SVP of Business Development
    Whether your nemesis is a malicious attack, a hurricane or (more likely) human error, have you collected all the tools you need to triumph and save the day?

    There are a host of technologies available to those prepping for potential business disruptions: backups on-premise, backups in the cloud, on-premise failovers, Disaster Recovery as a Service, and, of course, delivering an offering of cable and silicon to your mainframe every Tuesday at noon.

    Obviously, you don’t need all of these options – but which do you need? And why would you choose one over the other? Join this webinar to learn:
    - What has changed since your tried-and-true backup plan was hatched in 2010
    - How to evaluate on-premise vs. cloud-based options
    - How to marry different technologies to create a complete solution
    - What to consider when selecting a technology or cloud partner

    With 10 years of experience leading the DRaaS and Backup market around the world, we’ve seen a lot of technologies come and go – and have some strong opinions and solid guidance for our customers on how best to evaluate options.
  • New Rules for Recovery: Setting Expectations for Today's Continuity Platforms Recorded: May 4 2016 47 mins
    Jim Whalen, Taneja Group; Dave LeClair, Unitrends
    Traditionally, when people talk about data protection, they’re talking about some form of backup. However, if those backups effectively end up in a “write-only memory”, they’re not much good. So really, the bottom line is recovery is what people are most concerned about when they talk about data protection. With the degree to which today’s technologies have been refined and the plethora of data protection platforms available, users should maintain a baseline set of simple expectations to be met no matter who or what they choose for the job. In this presentation, Taneja Group and Dave LeClair of Unitrends will discuss the “New Rules for Recovery” that everyone’s solution should adhere to.
  • Kick the Legacy Backup Habit with Veeam and Quantum Recorded: Apr 19 2016 29 mins
    Nick Serrecchia, Systems Engineer at Veeam and Terry Grulke, Sr. Technical Advisor at Quantum
    With the average company experiencing unplanned downtime 13 times a year, the costs associated with continuing to invest in a legacy backup solution can be extensive. For this reason, more customers are switching to Veeam® and Quantum than ever before. Update to a modern data center and achieve Availability for the Always-On Enterprise™ with Veeam coupled with Quantum’s tiered storage that increases performance, reduces bandwidth requirements and executes a best practices for data protection.
  • Enhancing Data Center Operational Performance via Wearable Technology Recorded: Mar 16 2016 41 mins
    Jose Ruiz, VP Engineering Operations, Compass Datacenters
    As has often been reported, human error is one of the largest factors in data center outages. Since estimates of the average cost of an outage now exceed $740,000, the ability to reduce or eliminate man-caused outages can make a substantial impact on the organization’s bottom line. In this presentation, Jose Ruiz, VP of Engineering Operations for Compass Datacenters, will present a case study on how the introduction of wearable technology has enhanced one customer’s operational performance substantially.
  • Recovery Assurance: The Critical Success Factor for Cloud-based DR Recorded: Mar 9 2016 58 mins
    Jim Whalen, Taneja Group; Dave LeClair, Unitrends
    Mike Tyson famously observed “Everybody has a plan until they get punched in the mouth.” The question is, will your Disaster Recovery plan survive that punch and save the day? In this presentation, Jim Whalen of Taneja Group and Dave LeClair of Unitrends will discuss cloud-based Disaster Recovery, how Recovery Assurance is an absolutely crucial component of any DR plan and why choosing a DRaaS provider needs to be on everyone’s short list of options when developing their Disaster Recovery plans.
  • Protect your on-premise investments with the cloud Recorded: Feb 9 2016 46 mins
    Tom Fuchs
    Do you want to learn about new disaster recovery options from Microsoft experts? Have you been putting off trying new technology due to time pressures or not knowing where to start? Do you think your disaster recovery strategy would benefit from a refresh?

    If you answered yes to any of these questions, you need to register for this webcast. You will learn:
    •How to replicate any workloads to Microsoft's global datacenters
    •How to back up data and protect workloads with nearly infinite scalability
    •How to implement a hybrid replication using both cloud and on-premises solutions
    •How to create a backup without needing to buy more tape
    •How to back up your Windows clients (including Windows 10) to remote storage

    Register now to watch live or receive notification when this program is available on-demand.
  • Protect Your Business with Cloud-Based Disaster Recovery Recorded: Jan 27 2016 47 mins
    Eric Bassier, Senior Director of Datacenter Products
    Learn how to protect your business against localized disaster, eliminate capital expense, and answer the cloud mandate with Quantum’s newest cloud offering – Q-Cloud Protect for AWS. This webinar will demonstrate how to use the cloud for disaster recovery, as well as archiving and cold storage with Q-Cloud Vault and Q-Cloud Archive. Find out how to leverage the public cloud for data recovery with a solution that plugs into your existing backup environment.
  • Encryption Key Management Simplified Recorded: Jan 21 2016 37 mins
    Liz Townsend, Director of Business Development, Townsend Security
    Your encrypted data is only as secure as your encryption keys. A strong encryption key management strategy is essential for a comprehensive security policy, as well as meeting compliance requirements. Attendees of this presentation will learn:

    - Principles and best practices for encryption key management including key management, key storage, secure key retrieval, key escrow, key mirroring, industry standards, compliance guidelines, and system audit
    - Why certifications are important for meeting compliance regulations such as PCI-DSS and HIPAA/HITECH
    - How key management systems work and how to evaluate vendor solutions.

    This is a non-technical session but will be of value to developers and implementers. Attendees will learn the core principles of effective and secure encryption key management. These principles can be used in developing in-house key management solutions or in evaluating vendor solutions.

    What you'll learn:

    - What is encryption key management and why is it important?
    - Principles of industry-standard key management
    - Industry must-haves for effective key management
    - Challenges of home grown key management solutions
    - Important certifications for meeting compliance and evaluation vendors
tactical solutions to help with your BCDR strategy
With the unexpected nature of natural disasters and other disruptive events, preparation is key when it comes to disaster recovery and business continuity processes. Join this channel for live and recorded presentations featuring thought leaders in the field discussing current topics that will help you with tactical solutions to all your BCDR issues.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Microsoft Azure for Disaster Recovery in Education
  • Live at: Jan 18 2016 4:50 pm
  • Presented by: Sheela Varadhan, Microsoft; Chris Irwin, SADA Systems
  • From:
Your email has been sent.
or close