Online Backup Plus Frequently Asked Questions
|
|
- Nora Melissa Cox
- 8 years ago
- Views:
Transcription
1 Online Backup Plus Frequently Asked Questions
2 1 INSTALLATION 1.1 Who installs the Redstor Online Backup Plus service? 1.2 How does the installed client connect to Redstor s Cloud Platform? 1.3 On which machines is Redstor s Online Backup Plus software installed? 1.4 Can Redstor s Online Backup Plus client be installed remotely? 1.5 Can I do a silent install of the software? 2 CONFIGURATION OF BACKUPS & SCHEDULES 2.1 What access permissions are required to configure the backup client? 2.2 Whose responsibility is it to configure the backup sets and schedules? 2.3 Which user(s) will have access to configure backup sets and schedules? 2.4 Can users be responsible for their own backups? 2.5 What options are available for setting the frequency of backups? 2.6 What options are available for setting the granularity of the backup sets? 2.7 In what order will backup sets be backed up? Can a machine or folder be prioritised? 2.8 Is it possible for multiple machines to be backed up simultaneously? 2.9 Can limits be placed upon the backup window timeframe? 3 DATA BACKUP AND THE REDSTOR ONLINE BACKUP PLUS CLIENT 3.1 How is the initial backup completed? 3.2 How are subsequent backups completed? 3.3 Is it necessary to create a separate user on all devices on which the service backs up data? 3.4 What is data de-duplication? 3.5 What is delta restore? 3.6 Can very large file systems be protected? 3.7 Does the client cache data locally? 3.8 If a backup is interrupted due to a crash or lost connection, how is this handled? 3.9 Does Online Backup Plus maintain a constant connection to Redstor s platform? 3.10 How many versions of my files will be held on Redstor s platform 3.11 Are permissions retained when files are backed up by Redstor Online Backup Plus? 3.12 Is Redstor Online Backup Plus able to back up open files? 3.13 How is Online Backup Plus affected by hard drive defragmentation? 3.14 What happens if the machine on which Online Backup Plus is installed, fails permanently? 3.15 Once the initial backup set has been configured, is it possible to change this later on? 4 DATA TRANSMISSION 4.1 How does Redstor ensure the secure transmission of data off-site? 4.2 What happens if the secure connection is disrupted or lost? 4.3 What data is transferred each time a backup takes place? 4.4 Is it possible to monitor bandwidth usage during and after a backup? 4.5 Is it possible to restrict / limit bandwidth utilisation?
3 5 OFF-SITE STORAGE AT REDSTOR 5.1 How is data stored off-site on Redstor s platform? 5.2 Who has access to my data while it is stored on Redstor s platform? 5.3 What physical security measures are in place at Redstor s data centres? 5.4 Is my data held in more than one location whilst off-site? 6 RESTORATION OF DATA 6.1 At what point is my data protected and available for restore in the event of a disaster? 6.2 Does data have to be restored to the machine from which it came? 6.3 Can I restore individual files rather than a whole backup set? 6.4 How does Online Backup Plus handle Exchange restores including individual s? 6.5 How does Online Backup Plus handle SQL restores? 6.6 Can I restore an entire backup set to a previous point in time? 7 COMPRESSION, ENCRYPTION & SECURITY 7.1 Why does Redstor encrypt data? 7.2 What encryption standards are used? 7.3 Why is data compressed and what does this mean? 7.4 What level of compression can be expected? 8 MONITORING 8.1 How does Redstor monitor the service? 8.2 How is the Online Backup Plus service administered on an on-going basis? 8.3 What functionality is available on Redstor s web portal? 9 DISASTER RECOVERY 9.1 In the event of a disaster, can I prioritise the restoration of my most critical data first? 9.2 Can I request a test restore to ensure the system is working as expected? 9.3 In the event of a fire or flood where my whole site is lost, how can I restore my data? 10 LOCAL STORAGE 10.1 Does Redstor s Online Backup Plus solution include a local copy of my data? 10.2 What are the advantages of having a local copy of data? 11 ENDPOINT PROTECTION 11.1 I want to protect data residing on laptops and PCs as well as servers. Can Online Backup Plus do this? 12 VIRTUALISATION 12.1 Is it possible for Redstor s Online Backup Plus client to run from a virtual machine? 12.2 Can I backup my virtual machines using Redstor Online Backup Plus?
4 1 INSTALLATION 1.1 Who installs the Redstor Online Backup Plus service? Typically the end user or their service provider will install the backup software having received sufficient training from Redstor. However, it is possible to request Redstor to help with the installation(s). This is something that can be discussed with your account manager. 1.2 How does the installed client connect to Redstor s Cloud Platform? The backup client communicated on port 443 on the following range of IP addresses and to for authentication. All client to platform communications are secured with SSL and all communications come outbound from the client to the Redstor servers. 1.3 On which machines is Redstor s Online Backup Plus software installed? The software is typically installed on the device where the data is held. However, if you intend to backup data from a device on which a backup client cannot be installed, for example a NAS device or an unsupported operating system, the UNC backup functionality can be used from another host to protect the data remotely. 1.4 Can Redstor s Online Backup Plus client be installed remotely? Yes. The software can be installed remotely using conventional remote desktop tools (RDP & VNC, etc). 1.5 Can Redstor s Online Backup Plus client be installed silently? Yes. The client can be installed silently, deployed through a range of different deployment tools and configured centrally using the management console. 2 CONFIGURATION OF BACKUPS & SCHEDULES 2.1 What access permissions are required to configure the backup client? The user installing / configuring the backup client needs to have sufficient permissions to install the software. This typically is a user with administrative privileges such as the local or domain administrator. 2.2 Whose responsibility is it to configure the backup sets and schedules? It is the responsibility of the end user to determine and configure the backup schedule. 2.3 Which user(s) will have access to configure backup sets and schedules? By default, a user with access to the client can configure the backup selections and schedules, however, access to features in the interface, such as setting selections or changing schedules, can be removed if required. 2.4 Can users be responsible for their own backups? Yes, depending on the agreement between the service provider and the end user 2.5 What options are available for setting the frequency of backups? Backups can be configured with almost any frequency required and manual backups can be run at any time. This includes the option to create advanced schedules. For example, a schedule can be configured to run SQL backups twice daily with system state backups only running once weekly.
5 2.6 What options are available for setting the granularity of the backup sets? The selection options range from the inclusion of specific files through to entire volumes, with options to exclude files of any given extension (eg mp3 files). The client also supports the backup of a comprehensive set of applications, which can be scheduled together with or independently of file system backups. 2.7 In what order will backup sets be backed up? Can a machine or folder be prioritised? The most recently started backup will always be prioritised so that the newest data (often the most important) is protected first by the backup application. Scheduling can also be used to prioritise the order in which your data is protected. 2.8 Is it possible for multiple machines to be backed up simultaneously? Yes, assuming that each machine is protected by a locally installed backup client 2.9 Can limits be placed upon the backup window timeframe? Yes, bandwidth limitations can be set during working hours to restrict any possible impact the client may have from running during working hours. The option to cancel any running backups during these times is also available. 3 DATA BACKUP AND THE REDSTOR ONLINE BACKUP PLUS CLIENT 3.1 How is the initial backup completed? The initial backup is a full backup (albeit compressed and deduplicated) which can either be completed online or alternatively using a portable device (snapshot backup). Typically the size of the first backup and available bandwidth will determine the transfer method used. 3.2 How are subsequent backups completed? Subsequent backups will be incremental with only the unique blocks that have been created since the previous backup being sent to the platform in a compressed and encrypted format. 3.3 Is it necessary to create a separate user on all devices on which Online Backup Plus backs up data? No. The backup application runs as a service/daemon. By default it will be installed as the local system user/root but it is possible to specify an alternative user. E.g. Administrator NOTE: This is typically only required when local system permissions are not sufficient to backup data. 3.4 What is data de-duplication? Data de-duplication is a technology applied during the backup process where duplicated data blocks are identified and a reference to the existing copy of the block is made rather than duplicating it. This process minimises the network impact of the application, reducing the backup window and the cost of the service by storing less data on the backup solution. 3.5 What is delta restore? Delta restore utilises the same mechanism as deduplication in order to perform high speed restores. Often when a restore is performed, many of the data blocks required to restore a file already exist on the target server in other copies or versions of the file. Delta restore makes use of these local blocks and uses them to reassemble the file locally where possible, only restore data over the internet when a block is completely unique to the file being restored. This reduces the network load and can drastically improve the speed of restores.
6 3.6 Can very large file systems be protected? Yes, individual file systems in excess of 10 million files are successfully being protected with this service. A unique technology, Stacked Directory Hashing, makes the client extremely effective at scanning file systems and identifying where data in the backup set has been modified. Unlike other solutions, this does not require every file in the selection to be accessed making it more practical to backup large file systems. 3.7 Does the client cache locally? No. During a backup, data is prepared into small data cabinets and sent to the online platform directly from RAM, minimising the disk space required by the client and minimising the disk I/0 required to complete a backup. 3.8 If a backup is interrupted due to a lost connection, how is this handled? Should a network interruption occur during the backup process, the backup is simply paused until the connection is available again. At this time the client reconnects to the platform and resumes the process. 3.9 Does Online Backup Plus maintain a constant connection to Redstor s platform? No. The client connects every 5 minutes to the management server to see if any changes have been made to the client configuration or if any remote commands have been set for the client. These connections are extremely light and should this connection fail, there is no immediate impact on the client, it will simply connect again once the network is available How many versions of my files will be held on Redstor s platform? By default the Redstor Online Backup Plus service stores up to 60 days worth of backups, regardless of how many backups have run in that period. Any retention can be configured on request and occasional backups can also be stored in perpetuity if required (archive sessions). Please contact your account manager for more details of the options available Are permissions retained when files are backed up by Redstor Online Backup Plus? Yes. The backup client allows the restoring of file and folder permissions when conducting restores Is Redstor Online Backup Plus able to back up open files? Yes. The backup client supports the backup of open files through VSS (Windows OS) 3.13 How is Online Backup Plus affected by hard drive defragmentation? Disk defragmentation may cause an increased load on your system which may have knock on effect on the backup performance. Where possible these should be scheduled to run at differant times of day. Defragmentation will have no impact on the volume of data sent by the client What happens if the machine on which Online Backup Plus is installed, fails permanently? If the server requires replacement, it is possible to reinstall the client software on the new server and perform a reconnection to the existing account. It will be necessary to have the access to the account name, password and user defined encryption key during this automated process Once the initial backup set has been configured, is it possible to change this later on? Yes. The backup set(s) can be modified post initial configuration.
7 4 DATA TRANSMISSION 4.1 How does Redstor Online Backup Plus ensure the secure transmission of data off-site? Data is encrypted at source and remains encrypted end-to-end, with a choice of encryption algorithms, ranging from 128bit AES, 256bit AES or 448bit blowfish encryption. The software also utilises SSL encryption during data transmission for extra security. 4.2 What happens if the connection is corrupted or lost? The software includes a robust reconnection mechanism so the connection will re-establish, automatically, as soon as possible. 4.3 What data is transferred each time a backup takes place? An encrypted and compressed copy of any unique data blocks that appeared since the last backup of the server and reference data to describe how files can be reassembled from the unique blocks. 4.4 Is it possible to monitor bandwidth usage during and after backup? The client has a progress monitor that shows rate at which data is being processed during the backup, along with an estimated time remaining. Further statistics are available via console reporting. 4.5 Is it possible to restrict / limit bandwidth utilisation? Yes. The client can be set to throttle bandwidth at user specified times through the options menu. The throttle can also be disabled at weekends if appropriate. 5 OFF-SITE STORAGE AT REDSTOR 5.1 How is data stored off-site on Redstor s Platform? Data is stored at two geographically separate data centre locations. The primary being in Slough, UK and the mirror site being in Reading, UK. The data is stored at rest using your choice of 128bit AES, 256bit AES or 448bit blowfish encryption. Mirroring of data between the primary and secondary platform is continuous, ensuring data availability from each site. 5.2 Who has access to my data while it is stored on Redstor s platform? Data on the Redstor platform is encrypted at all times, so even though the data is accessible to Redstor s administrators, it is not in a usable format. Data can only be accesed in its original format using the backup client and encryption details specified by the user of the service. 5.3 What physical security measures are in place at Redstor s data centres? Redstor data centres are highly secure with CCTV surveillance, 24/7 security and state of the art physical security. 5.4 Is my data held in more than one location whilst off-site? Yes. Data is held in two locations (primary and mirror) both of which are within the United Kingdom. 6 RESTORATION OF DATA 6.1 At what point is my data protected and available for restore in the event of a disaster? From the point at which your first successful backup completes, data is available online 24/7/365 days a year with the exception of any scheduled or unscheduled downtime. 6.2 Does data have to be restored to the machine from which it came? No. Data can be restored to a remote target or alternatively, a client can be installed on another machine and run in Restore Only mode.
8 6.3 Can I restore individual files rather than a whole backup set? Yes. 6.4 How does Online Backup Plus handle Exchange restores including individual s? Exchange data is protected at the mail store/database level. The restoration options will depend on the version of Exchange in use. For more information relating to the recovery of Exchange data, including our guide to restoring individual mails, please refer to the Redstor knowledge base. 6.5 How does Online Backup Plus handle SQL restores? SQL restores can be performed directly back to the source database, or can be restored to another location of your choice, allowing them to be mounted in other data bases or on other servers. 6.6 Can I restore an entire backup set to a previous point in time? Yes. It is possible to select an entire drive(s) for restore. System state is restored separately. Please refer to the manual for further information. 7 COMPRESSION, ENCRYPTION & SECURITY 7.1 Why does Redstor encrypt data? Data is encrypted to ensure data security. Even if unauthorised access is gained to the data stored on the platform, it is unusable without the encryption key set by the user of the service. 7.2 What encryption standards are used? Data is encrypted at source using your chouce of 128bit AES, 256bit AES or 448bit blowfish encryption algorithms. SSL/TLS is also used to transmit data to the platform for additional security. 7.3 Why is data compressed and what does this mean? Data is compressed to save disk space and bandwidth. Compression is a method of reducing the space requirement for the storing of data. 7.4 What level of compression can be expected? It depends. Whilst text and word processor documents compress very well (>50%) pictures and video may not benefit greatly from compression. 8 MONITORING 8.1 How does Redstor monitor the service? Redstor monitors the service at multiple levels by including the application and infrastructure levels. Monitoring is conducted both by technicians and automated availability/performance monitoring tools. 8.2 How is the Online Backup Plus service administered on an on-going basis? Although the service can be setup and then left to run automatically, as best practise, we recommend configuring daily backup reports and actively checking the completion status of backups using the management console to ensure no errors ooccur. 8.3 What functionality is available on Redstor s web portal? Redstor can provide access to a web portal that can be used to track usage of the service and report on how usage has changed over time.
9 9 DISASTER RECOVERY 9.1 In the event of a disaster, can I prioritise the restoration of my most critical data first? Yes. It is possible to choose the order in which files are recovered. 9.2 Can I request a test restore to ensure the system is working as expected? Yes you can perform test restores via the internet at your convenience. Should you wish to perform a test HDD snapshot restore via courier, charges may apply. 9.3 In the event of a fire or flood where my whole site is lost, how can I restore my data? You would be able to restore the data to an alternative location or multiple locations. Simply install the backup client, reconnect to the account and then select the data to be restored. The data can also be delivered to a disaster recvovery site for high speed LAN based restore if required. 10 LOCAL STORAGE 10.1 Does Redstor s Online Backup Plus solution include a local backup of my data? The backup client can be configured to use the Local Speed Vault option. This option writes a third copy of your data to a local storage target specified by the user, this is then used preferentially for high speed restores. This option is free of charge What are the advantages of having a local copy of my data? Speed of restore is improved where the internet connection is slow or unreliable. 11 ENDPOINT PROTECTION 11.1 I want to protect data residing on laptops and PCs as well as servers. Can Online Backup Plus do this? Yes we have a Desktop and Laptop version of the software which supports the following operating systems: Desktop and Laptop Edition Windows XP (SP3 +) Windows Vista Windows 7 Windows 8 MAC OS X ( ) 12 VIRTUALISATION 12.1 Is it possible for Redstor s Online Backup Plus client to run inside a virtual machine? Yes. Backups of Virtual Machines using a client natively installed are fully supported Can I backup my Virtual Machines using Redstor Online Backup Plus? Yes. Redstor provide plug-ins for both HyperV and VMware, which allow full virtual machine backups to be taken and virtual disk restores to be performed.
Online Backup Frequently Asked Questions
Online Backup Frequently Asked Questions 1 INSTALLATION 1.1 Who installs the Redstor Online Backup service? 1.2 How does the installed client connect to Redstor s Cloud Platform? 1.3 On which machines
More informationHow To Use Attix5 Pro For A Fraction Of The Cost Of A Backup
Service Overview Business Cloud Backup Techgate s Business Cloud Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house
More informationWeb-Based Data Backup Solutions
"IMAGINE LOSING ALL YOUR IMPORTANT FILES, IS NOT OF WHAT FILES YOU LOSS BUT THE LOSS IN TIME, MONEY AND EFFORT YOU ARE INVESTED IN" The fact Based on statistics gathered from various sources: 1. 6% of
More informationFAQ. Hosted Data Disaster Protection
Hosted Data Disaster Protection Flexiion is based in the UK and delivers Infrastructure as a Service (IaaS) solutions, making the advantages of the Cloud and IaaS more accessible to mid-size, professional
More informationBest Practices for Trialing the Intronis Cloud Backup and Recovery Solution
Best Practices for Trialing the Intronis Cloud Backup and Recovery Solution Intronis Cloud Backup and Recovery is a file based backup application that allows users to back up their critical data to the
More informationSystem Management. What are my options for deploying System Management on remote computers?
Getting Started, page 1 Managing Assets, page 2 Distributing Software, page 3 Distributing Patches, page 4 Backing Up Assets, page 5 Using Virus Protection, page 6 Security, page 7 Getting Started What
More informationOverview. Timeline Cloud Features and Technology
Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers
More informationActiveImage Protector 3.5 for Hyper-V with SHR. User Guide - Back up Hyper-V Server 2012 R2 host and
ActiveImage Protector 3.5 for Hyper-V with SHR User Guide - Back up Hyper-V Server 2012 R2 host and restore individual virtual machines 2 nd Edition July 7, 2014 Copyright NetJapan, Inc. All Rights Reserved.
More informationService Overview CloudCare Online Backup
Service Overview CloudCare Online Backup CloudCare s Online Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house
More informationDisk-to-Disk-to-Offsite Backups for SMBs with Retrospect
Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect Abstract Retrospect backup and recovery software provides a quick, reliable, easy-to-manage disk-to-disk-to-offsite backup solution for SMBs. Use
More informationSymantec Backup Exec.cloud
Automatic, continuous, and secure protection that backs up data to the cloud, or via a hybrid approach combining on-premise and cloud-based backup. Data Sheet: Symantec.cloud Only 21 percent of SMBs are
More informationService Level Agreement (SLA) Arcplace Backup Enterprise Service
(SLA) Arcplace Backup Enterprise Service 1. Introduction This Service Level Agreement ( SLA ) forms an integral part of the Agreement between Arcplace and Customer. This SLA describes the Backup Enterprise
More informationKaseya 2. User Guide. Version 7.0. English
Kaseya 2 Backup User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated
More informationTECHNOLOGY OVERVIEW INTRONIS CLOUD BACKUP & RECOVERY
INTRONIS CLOUD BACKUP & RECOVERY TECHNOLOGY OVERVIEW CONTENTS Introduction 3 Ease-of-Use 3 Simple Installation 3 Automatic Backup 3 Backup Status Dashboard 4 Off-Site Storage 4 Scalability 4 File Restoration
More informationThe EVault Portfolio
The EVault Portfolio Built from the start as a pure disk-to-disk solution, EVault is the only data protection platform that can be consumed as a cloud service, deployed as on-premise software, an on-premise
More informationContinuous Data Protection. PowerVault DL Backup to Disk Appliance
Continuous Data Protection PowerVault DL Backup to Disk Appliance Continuous Data Protection Current Situation The PowerVault DL Backup to Disk Appliance Powered by Symantec Backup Exec offers the industry
More informationFrequently Asked Questions About WebDrv Online (Remote) Backup
Frequently Asked Questions About WebDrv Online (Remote) Backup GENERAL INFORMATION Why backup? What is online backup? What if we already have a tape backup system? How secure are online backups? What tasks
More informationStorage Guardian Remote Backup Restore and Archive Services
Storage Guardian Remote Backup Restore and Archive Services Storage Guardian is the unique alternative to traditional backup methods, replacing conventional tapebased backup systems with a fully automated,
More informationPresents. Attix5 Technology. An Introduction
Presents Attix5 Technology An Introduction January 2013 1. Global Block Level Deduplication. Attix5 Feature Top 10 Things That Matter When Attix5 is first installed on a target server a full backup is
More informationProduct Brief. it s Backed Up
Product Brief it s Backed Up IT Authorities, Inc. 1/11/2010 Table of Contents Contents Table of Contents... 2 it s Backed Up... 3 Backup... 3 Backup, Continued... 4 Backup, Continued... 5 Application Aware
More informationData Protection Simple. Compliant. Secure. CONTACT US Call: 020 3397 9026 Email: Support@jms-securedata.co.uk Visit: www.jms-securedata.co.
Data Protection Simple. Compliant. Secure CONTACT US Call: 020 3397 9026 Email: Support@jms-securedata.co.uk Visit: www.jms-securedata.co.uk COMPLEX CHALLENGES SIMPLE SOLUTIONS Backups Tricky but necessary
More informationAttix5 Pro Overview. V7.x. An overview of the Attix5 Pro product suite.
Attix5 Pro Overview V7.x An overview of the Attix5 Pro product suite. Copyright notice and proprietary information This document is published by Attix5 or its local affiliated company, without any warranty.
More informationVANGUARD ONLINE BACKUP
VANGUARD ONLINE BACKUP Product Description Vanguard Online Backup is a world class solution that automates off-site and on-site backups. The application combines an easy to use interface with powerful
More informationDATA BACKUP & RESTORE
DATA BACKUP & RESTORE Verizon Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable. Offsite backup is
More informationCloud Backup Service Service Description. PRECICOM Cloud Hosted Services
Cloud Backup Service Service Description PRECICOM Cloud Hosted Services Table of Contents Table of Contents 2 1. Cloud Backup Service Service Summary 3 2. Cloud Backup Service Service Definition 4 2.1.
More informationSTREAD CLOUD BACKUP MILITARY-GRADE ONLINE BACKUP BUILT FOR YOUR BUSINESS
STREAD CLOUD BACKUP MILITARY-GRADE ONLINE BACKUP BUILT FOR YOUR BUSINESS STREAD Cloud Backup is an affordable backup and recovery solution for all your mission critical business information on all devices
More informationInstallation and Setup: Setup Wizard Account Information
Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account
More informationVersion 10. IV- Client Software Manual
Version 10 IV- Client Software Manual Table of Contents CHECKLIST... 1 VAULTLOGIX IV-CLIENT PRE-INSTALLATION REQUIREMENTS... 3 DOCUMENT REVISION HISTORY TABLE... 4 INITIAL SETUP AND CONFIGURATION... 5
More informationHyper-V backup implementation guide
Hyper-V backup implementation guide A best practice guide for Hyper-V backup administrators. www.backup-assist.ca Contents 1. Planning a Hyper-V backup... 2 Hyper-V backup considerations... 2 2. Hyper-V
More informationEvault 2TB Tower Appliance. www.evault.com www.ev365.com
Evault 2TB Tower Appliance 1 Easy to Deploy, Easy to Manage Central Control Monitor and manage backups Installed on a laptop or Workstation or through Web Brower Centralized Management Console Administrator
More informationMake life simple and make more money the easy way.
Technical factsheet Make life simple and make more money the easy way. MAX Backup - fast, reliable, automatic, offsite, secure backup and disaster recovery to make your life easier! No more worrying about
More informationZen Internet. Online Data Backup. Zen Vault Express for Windows. Issue: 2.0.08
Zen Internet Online Data Backup Zen Vault Express for Windows Issue: 2.0.08 Contents 1 Introduction... 3 1.1 System Requirements... 3 2 Installation... 5 2.1 The Setup WIzard... 5 3 The Backup Service...
More informationCA ARCserve Family r15
CA ARCserve Family r15 Rami Nasser EMEA Principal Consultant, Technical Sales Rami.Nasser@ca.com The ARCserve Family More than Backup The only solution that: Gives customers control over their changing
More informationSynapseBackup Secure backups and disaster recovery services for both physical and virtual environments. Top reasons on why SynapseBackup is the best
SynapseBackup Secure backups and disaster recovery services for both physical and virtual environments Synapse have been both using and offering online backup solutions to clients since 1998. An online
More informationReadyRECOVER. Reviewer s Guide. A joint backup solution between NETGEAR ReadyDATA and StorageCraft ShadowProtect
ReadyRECOVER Reviewer s Guide A joint backup solution between NETGEAR ReadyDATA and StorageCraft ShadowProtect Table of Contents NETGEAR Contact Info... 3 Product Category... 3 Overview... 3 ReadyRECOVER...
More informationBackupAssist v5 vs. v6
COMPARISON www.backupassist.com 2 What s new in BackupAssist version 6? There are three main reasons why you should upgrade to BackupAssist v6: 1. To keep up with the latest best practice backup standards
More informationBackupAssist v6 quickstart guide
Using the new features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 2 Backing up VSS applications... 2 Restoring VSS applications... 3 System State backup and restore...
More informationVodacom Managed Hosted Backups
Vodacom Managed Hosted Backups Robust Data Protection for your Business Critical Data Enterprise class Backup and Recovery and Data Management on Diverse Platforms Vodacom s Managed Hosted Backup offers
More informationUser Guide. CTERA Agent. August 2011 Version 3.0
User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission
More informationVMware/Hyper-V Backup Plug-in User Guide
VMware/Hyper-V Backup Plug-in User Guide COPYRIGHT No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying,
More informationBusiness Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide
WHITE Deployment PAPERGuide Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide An Acronis White Paper Copyright Acronis, Inc., 2000 2011 Deployment Guide Table of contents About
More informationBackupAssist v6 quickstart guide
New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet
More informationHELPDESK & SERVER MONITORING. Helpdesk HOURS OF COVER KEY FEATURES
HELPDESK & SERVER MONITORING Organisations are under pressure to implement efficient, reliable and cost effective helpdesk And server monitoring service solutions. Our Helpdesk & Server Monitoring services
More informationBoost your storage buying power... use ours!
TM TM Data Sheets : White Papers : Case Studies For over a decade Coolspirit have been supplying the UK s top organisations with storage products and solutions so be assured we will meet your requirements
More informationWe take care of backup and recovery so you can take care of your business. INTRODUCING: HOSTED BACKUP
We take care of backup and recovery so you can take care of your business. INTRODUCING: HOSTED BACKUP RecoveryVault Hosted Backup allows Rico Teles at Sephaku Holdings to ensure recovery of all mission
More informationBackup Exec Private Cloud Services. Planning and Deployment Guide
Backup Exec Private Cloud Services Planning and Deployment Guide Chapter 1 Introducing Backup Exec Private Cloud Services This chapter includes the following topics: About Backup Exec Private Cloud Services
More informationVembu BDR v2.0.2. Release Notes. Major features in v2.0.2. Other features in Vembu BDR. Cloud Disaster Recovery Service. VMware UltraBlaze.
Vembu BDR v2.0.2 Release Notes Vembu BDR v2.0.2 is now publicly released and is available for production deployments with new features and more bug fixes which improves the stability and performance. Also,
More informationVIPERVAULT STORAGECRAFT SHADOWPROTECT SETUP GUIDE
VIPERVAULT STORAGECRAFT SHADOWPROTECT SETUP GUIDE Solution Overview Thank you for choosing the ViperVault cloud replication, backup and disaster recovery service. Using this service you can replicate your
More informationAttix5 Pro. Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition. V6.0 User Manual for Mac OS X
Attix5 Pro Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition V6.0 User Manual for Mac OS X Copyright Notice and Proprietary Information All rights reserved. Attix5, 2011 Trademarks
More informationREDCENTRIC MANAGED BACKUP SERVICE SERVICE DEFINITION
REDCENTRIC MANAGED BACKUP SERVICE SERVICE DEFINITION SD003 V2.3 Issue Date 02 July 2014 1) SERVICE OVERVIEW The Managed Backup Service (MBS) is a streamlined alternative to traditional backup and restore
More informationKaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
More informationCrashPlan PRO Enterprise Backup
CrashPlan PRO Enterprise Backup People Friendly, Enterprise Tough CrashPlan PRO is a high performance, cross-platform backup solution that provides continuous protection onsite, offsite, and online for
More informationCTERA Agent for Mac OS-X
User Guide CTERA Agent for Mac OS-X June 2014 Version 4.1 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
More informationActiveImage Protector 3.5 for Hyper-V Enterprise. User Guide - Backup Hyper-V Server 2012 R2 host and
ActiveImage Protector 3.5 for Hyper-V Enterprise User Guide - Backup Hyper-V Server 2012 R2 host and restore individual virtual machines First Edition - July 7, 2014 Copyright NetJapan, Inc. All Rights
More informationBackup and Recovery FAQs
May 2013 Page 1 This document answers frequently asked questions regarding the Emerson system Backup and Recovery application. www.deltav.com May 2013 Page 2 Table of Contents Introduction... 6 General
More informationYiwo Tech Development Co., Ltd. EaseUS Todo Backup. Reliable Backup & Recovery Solution. EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1
EaseUS Todo Backup Reliable Backup & Recovery Solution EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1 Part 1 Overview EaseUS Todo Backup Solution Guide. All Rights Reserved Page 2 Introduction
More informationM4 Systems. M4 Online Backup. M4 Systems Ltd Tel: 0845 5000 777 International: +44 (0)1443 863910 www.m4systems.com www.dynamicsplus.
M4 Systems M4 Online Backup M4 Systems Ltd Tel: 0845 5000 777 International: +44 (0)1443 863910 www.m4systems.com www.dynamicsplus.net Table of Contents Introduction... 3 Benefits... 3 Features... 4 Data
More informationSymantec Backup Exec 2012
Better backup for all Data Sheet: Backup and Disaster Recovery Overview is one integrated product that protects virtual and physical environments, simplifies both backup and disaster recovery, and recovers
More informationeztechdirect Backup Service Features
eztechdirect Backup Service Features Introduction Portable media is quickly becoming an outdated and expensive method for safeguarding important data, so it is essential to secure critical business assets
More informationAcronis Backup & Recovery for Mac. Acronis Backup & Recovery & Acronis ExtremeZ-IP REFERENCE ARCHITECTURE
Acronis Backup & Recovery for Mac Acronis Backup & Recovery & Acronis ExtremeZ-IP This document describes the technical requirements and best practices for implementation of a disaster recovery solution
More informationOptimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems
Symantec Backup Exec 12.5 for Windows Small Business Server Premium and Standard Editions Comprehensive data protection and system recovery for Microsoft Windows Small Business Server Overview Symantec
More informationAVLOR SERVER CLOUD RECOVERY
AVLOR SERVER CLOUD RECOVERY WHITE PAPER 1 Table of Contents Abstract... 2 1. Introduction... 3 2. Server Cloud Recovery... 3 3. Amazon AWS Cloud... 4 a. What it is... 4 b. Why Use AWS?... 5 4. Difficulties
More informationVersion: 1.5 2014 Page 1 of 5
Version: 1.5 2014 Page 1 of 5 1.0 Overview A backup policy is similar to an insurance policy it provides the last line of defense against data loss and is sometimes the only way to recover from a hardware
More informationBDR for ShadowProtect Solution Guide and Best Practices
BDR for ShadowProtect Solution Guide and Best Practices Updated September 2015 - i - Table of Contents Process Overview... 3 1. Assess backup requirements... 4 2. Provision accounts... 4 3. Install ShadowProtect...
More informationComparing Online Enterprise Backup Systems. A reliable online backup system is essential for any business running workstations and
Lakin 1 Ronald Lakin CIS 130 Hardware Nick Romano September 28 2015 Comparing Online Enterprise Backup Systems A reliable online backup system is essential for any business running workstations and servers.
More informationOnline Disaster Recovery, Backup & Archive Solutions. VirtuousIT Ltd.
VirtuousIT Ltd 1 Table of Contents 1 Introduction 3 The Data Explosion 3 The Importance of Rapid System Recovery 3 2 The VirtuousIT Solution 4 3 RecoveryShield - Solutions 5 Large Business 5 Small Medium
More informationSecure Your Business with EVault Cloud-Connected Solutions
Secure Your Business with EVault Cloud-Connected Solutions Winfried Posthumus Channel Sales Manager NL Winfried.Posthumus@evault.com 11/22/2012 2012 EVault, Inc. All Rights Reserved 1 Agenda Who is EVault
More informationComplete Data Protection & Disaster Recovery Solutions
Complete Data Protection & Disaster Recovery Solutions Quadric Software 2015 We were looking at other solutions. Alike was the best with XenServer, and none of them had Alike s compression abilities. After
More informationSERVER EDITION for MICROSOFT WINDOWS. USER MANUAL v5.0
SERVER EDITION for MICROSOFT WINDOWS USER MANUAL v5.0 Table of Contents 1. Introduction...2 Overview... 2 System Requirements... 3 2. Installation...4 MSI Install Options... 4 The Setup Wizard... 5 Security
More informationEvolved Backup Features Computer Box 220 5th Ave South Clinton, IA 52732 www.thecomputerbox.com 563-243-0016
Evolved Backup Features 1 Contents 3 Introduction 3 Ease-of-Use Simple Installation Automatic Backup Off-Site Storage Scalability File Restoration 24/7 6 Security File Compression Encryption Transmission
More informationInteract Intranet Version 7. Technical Requirements. August 2014. 2014 Interact
Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...
More informationWHITE PAPER THE BENEFITS OF CONTINUOUS DATA PROTECTION. SYMANTEC Backup Exec 10d Continuous Protection Server
WHITE PAPER THE BENEFITS OF CONTINUOUS DATA PROTECTION SYMANTEC Backup Exec 10d Continuous Protection Server 1 TABLE OF CONTENTS EXECUTIVE SUMMARY...3 Current Situation...3 The New Opportunity...3 The
More informationUsing Time Machine to Backup Multiple Mac Clients to SNC NAS and 1000
Using Time Machine to Backup Multiple Mac Clients to SNC NAS and 1000 Application Note Abstract This application note describes how to use Time Machine to backup multiple Mac clients to SNC NAS and 1000.
More informationUni Vault. An Introduction to Uni Systems Hybrid Cloud Data Protection as a Service. White Paper Solution Brief
Uni Vault An Introduction to Uni Systems Hybrid Cloud Data Protection as a Service White Paper Solution Brief Contents The Challenges of Traditional Backup... 3 The Uni Systems Data Protection as a Service
More informationCTERA Agent for Windows
User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
More informationGladinet Cloud Backup V3.0 User Guide
Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet
More informationProduct Overview. Initial Seeding
Product Overview Initial Seeding After installing POPI Online Backup software on your servers, you can start backing up data to our secure cloud service over the Internet. Copying large amounts of data
More informationRingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816.
RingStor User Manual Version 2.1 Last Update on September 17th, 2015 RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816 Page 1 Table of Contents 1 Overview... 5 1.1 RingStor Data Protection...
More informationBDR TM V3.0 DEPLOYMENT AND FEATURES
BDR TM V3.0 DEPLOYMENT AND FEATURES VEMBU TECHNOLOGIES www.vembu.com Copyright Information Information in this document is subject to change without notice. The entire risk of the use or the results of
More informationEnterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...
CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...
More informationQuick Start Guide. Version R9. English
System Backup and Recovery Quick Start Guide Version R9 English February 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
More informationBACKUP STRATEGY AND DISASTER RECOVERY POLICY STATEMENT
TADCASTER GRAMMAR SCHOOL Toulston, Tadcaster, North Yorkshire. LS24 9NB BACKUP STRATEGY AND DISASTER RECOVERY POLICY STATEMENT Written by Steve South November 2003 Discussed with ICT Strategy Group January
More informationFEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO
FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO Copyright 2005 Shavlik Technologies. All rights reserved. No part of this document may be reproduced or retransmitted in
More informationIDrive, is a service offered by Pro Softnet Corporation, an ASP and Internet Solutions Provider, based in Woodland Hills, CA.
www.idrive.com Backup Review Rating (4 stars out of possible 5) Reviewed on July 27, 2008 Summary IDrive, is a service offered by Pro Softnet Corporation, an ASP and Internet Solutions Provider, based
More informationEaseUS Todo Backup user guide. EaseUS Todo Backup. Central Management Console. User guide - 1 -
EaseUS Todo Backup Central Management Console User guide - 1 - Table of Contents Welcome... - 3 - Overview... - 3 - How to use this manual... - 3 - Getting started... - 4 - Hardware requirements... - 4
More informationNovaBACKUP. Storage Server. NovaStor / May 2011
NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.
More informationSystem Protection for Hyper-V Whitepaper
Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 Definitions... 3 Considerations... 3 2. About the BackupAssist Hyper-V solution... 4 Advantages... 4
More informationKaseya 2. User Guide. Version 7.0. English
Kaseya 2 Data Backup User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS
More informationAcronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide
Acronis Backup & Recovery 10 Advanced Server Virtual Edition Quick Start Guide Table of contents 1 Main components...3 2 License server...3 3 Supported operating systems...3 3.1 Agents... 3 3.2 License
More informationBackup & Disaster Recovery Options
Backup & Disaster Recovery Options Since businesses have become more dependent on their internal computing capability, they are increasingly concerned about recovering from equipment failure, human error,
More informationArCycle vmbackup. for VMware/Hyper-V. User Guide
ArCycle vmbackup for VMware/Hyper-V User Guide 2 Copyright Copyright ArCycle Software, Ltd., 2011-2014. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system,
More informationwith the ArchiveSync Add-On Evaluator s Guide 2015 Software Pursuits, Inc.
with the ArchiveSync Add-On Evaluator s Guide 2015 Table of Contents Introduction... 2 System Requirements... 2 Contact Information... 3 Required Add-Ons for ArchiveSync in Real-Time... 3 Communications
More informationXopero Centrally managed backup solution. User Manual
Centrally managed backup solution User Manual Contents Desktop application...2 Requirements...2 The installation process...3 Logging in to the application...6 First logging in to the application...7 First
More informationENTERPRISE BUSINESS CONTINUITY BUILT FROM THE GROUND UP
BACKUP DISASTER RECOVERY APPLIANCES (BDRA) ENTERPRISE BUSINESS CONTINUITY BUILT FROM THE GROUND UP BDRA deliver the most aggressive Recovery Time Objective (RTO) of any backup, disaster recovery (BDR)
More informationHERO-DefendeRx & Secure-Cloud Overview
Failback/Restore-Should a failure occur, HEROware manages the Failback and Restore process for you. Please contact HEROware technical support to schedule your restoration process. HEROware s goal is simple,
More informationefolder BDR for Veeam Cloud Connection Guide
efolder BDR for Veeam Cloud Connection Guide Setup Connect Preload Data uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder Cloud for Veeam. Using the efolder Cloud
More informationServer Installation Manual 4.4.1
Server Installation Manual 4.4.1 1. Product Information Product: BackupAgent Server Version: 4.4.1 2. Introduction BackupAgent Server has several features. The application is a web application and offers:
More informationVembu NetworkBackup v3.1.1 GA
Vembu NetworkBackup v3.1.1 GA VEMBU TECHNOLOGIES www.vembu.com TRUSTED BY OVER 25,000 BUSINESSES Vembu NetworkBackup v3.1.1 GA - Release Notes With enhanced features and fixes boosting stability and performance,
More informationPROPALMS TSE 6.0 March 2008
PROPALMS March 2008 An Analysis of and Terminal Services: Contents System Administration... 2 Server Management... 3 Application Management... 5 Security... 7 End User Experience... 8 Monitoring and Reporting...
More information