Welcome to Dell Technologies Cyber recovery solutions.
Thank you for purchasing from the leading brand. When it comes to protecting your data, your project manager is sharing this video to provide you information on what to expect during your project.
The goal of this video is to guide you through the delivery process of your cyber recovery solution. The phases of the project include planning execution, monitoring, proof of concept testing and project closure.
We wanted to give you an idea of what to expect during the Dell delivery experience. There's a lot to be done but together we'll get through it using our proven processes and methodology planning planning.
Your installation is the most important step to ensure you get your solution designed and built the way you want it. We need you to be engaged and involved every step of the way.
In order to have a successful planning phase, there will be close cross functional collaboration between our technical teams. Data center site readiness is crucial to the success of the project and we'll be sure to cover all the bases with you.
So there are no unforeseen issues and that any identified issues are mitigated. Your Dell project manager will be reaching out to you if they haven't already and a project team will be assembled.
If you haven't had a kickoff meeting yet, you can rest assured that that will happen soon. The kickoff meeting is where our teams get to know who does what, what meetings are required to achieve our goals and what the timeline for implementation and delivery will be based on the scope of the project.
If design workshops are in scope, we'll set expectations for what the goals are execution. Once we begin designing your solution, we'll hold meetings or workshops.
If appropriate to gather information about your environment based on our findings, we'll create detailed designs and presentations as the customer, it's your decision as to what data goes in your vault, we cannot choose the data for you but may advise you based on previous implementations we've done. Once technical teams have been developed, we will seek your approval to move forward.
Dell will deliver your solution with a mix of on site and remote installation and configuration. Once we've completed the installation phase, we'll begin initial seeding of your data or replication to the vault.
Cyber recovery software will be configured along with cyber sense. If purchased monitoring throughout your implementation, there will be frequent communication between you and your team, your Dell project manager and the cyber recovery lead.
This includes regular status meetings and reporting as well as proactive issue resolution. There will also be active project oversight by Dell Professional Services leadership proof of concept restore test.
This test is performed inside the vault and should be done only after the solution is confirmed to be running as designed at this point. A run book will be completed and delivered if purchased project closure.
At the end of your implementation, there will be a functional overview with your technical team. At that time, the knowledge transfer described in the scope of work will be completed.
Project completion will come with your acceptance of your solution as delivered formally acknowledged by your sign off, a customer satisfaction survey will be sent which we appreciate you completing so that we can continue to improve our delivery expertise.
Again, thank you for choosing Dell technologies for your data protection and recovery needs.