You're about to go to the US
version of www.krollontrack.com.
Get Help Now!
800 872 2599
Free Online Quote
Contact Us Today!
800 645 3649
Free Online Quote
Contact a data recovery
Preparing to release a new toolset for their M600 line of SSD’s, Micron sought help from industry experts to vet the sanitize function of the new toolset. Keeping in line with Micron’s commitment to the security of their customer’s data, they wanted 3rd party verification that this new toolset’s sanitization function was 100% effective at returning a drive to “fresh-out-of-box” status. Micron proactively sought out Kroll Ontrack to perform a detailed analysis of sanitized drives through their Erasure Verification Services.
Read case study >
A flooded data center left a client’s servers and storage systems partially submerged in water. At the center of the damage was a HP Storage Works EVA (Enterprise Virtual Array) 6000 containing business critical SQL database files as well as employee file shares. The EVA sustained substantial physical damage due to the flood water preventing access to the data. The customer contacted HP Support for help and they handed the project over to Kroll Ontrack.
A large, North America based, manufacturer of building materials experienced a serious data loss due to a corrupt database file on their Commvault Media Server. The company lost access to media files crucial to the operation of their business. Kroll Ontrack was brought in to recover the data.
A large UK Government organization had to learn the hard way that even RAID 6 arrays, known for their reliability, are not 100 percent impervious to hardware failure. Unfortunately, the system failed to rebuild the data after two hard disk drives failed resulting in the loss of access to 24 terabytes of highly critical data. The organization approached the experts at Kroll Ontrack for help.
A single user’s laptop at a large pharmaceutical company was infected with CryptoLocker ransomware. This malware encrypts the user’s files and withholds the encryption key until you pay the ransom amount. The laptop was connected to the corporate network which allowed the malware to infect a CIFS volume which was set up as a file share on a NetApp FAS. The malware was able to infiltrate the file share and encrypt the majority of the files. The IT team was not notified of the infection until after the backup retention period had expired, meaning that the backup contained only encrypted data. The 46 affected drives were brought to Kroll Ontrack for data recovery.
The pharmaceutical company lost almost 4 million files of highly critical research and development data when moving files within the Isilon storage system. The “lost files” were mostly raw data gathered from chemical analysis in ongoing laboratory research work. The firm, together with EMC support, was able to recover 90 percent of the data using a standard rebuild process. To recover the desperately needed remaining files, Kroll Ontrack was contacted by the customer for help.
A large municipal event center in the US lost data on a Dell® EqualLogic™ iSCSI SAN configured with in a RAID 50 running VMware® ESXi™ 5.5. VMware snapshots filled up the datastore causing the system to crash. The customer attempted to delete one of the snapshots, but after four hours of processing without success they had to give up. Working with VMware support they were able to get the VMware ESXi 5.5 host to boot, but were missing critical data from six of the iSCSI LUNs. The event center called Kroll Ontrack at noon on a Saturday for emergency service.
A large manufacturing company experienced an unexpected data loss with its email system resulting from a series of failures. A clustered server system was in place using an Exchange server supporting over 1,000 users, but due to local log file storage, one of the cluster servers began exhibiting performance issues as it was running out of disk space. Shortly thereafter, a second node in the server array failed and it would not mount the Information Store. Microsoft’s support team assisted the IT staff by bringing the server offline, and after performing Information Store repairs and then an Information Store backup, the server was back online.
A large service and product organization with multiple international offices took on an Exchange 2010 migration project that would affect all of its locations. The migration scope was 20 offices, three network domains, and over 6,000 user mailboxes, and included: a Blackberry® Enterprise Server (BES), Outlook Web Access (OWA) services, and the introduction of Microsoft® Forefront® servers to the infrastructure.
A mid-sized organization made a SharePoint 2007 server available to a small number of managers within three business units on a test VMware® host server. One of the business managers had an IT background and began to leverage its features for numerous projects that were just beginning.
An IT manager for a large corporation has been asked to collect past email data for several employees to be used in pending litigation. They have been informed that a competitor will be suing them for possible patent infringement. Legal has given the IT team two days to collect email from users who may be involved. Due to the time constraints given by the legal team’s request, the production Exchange server cannot be taken offline or disrupted.