Epicor Eagle Verifying Secure Data Backup
|
|
|
- Virginia Heath
- 10 years ago
- Views:
Transcription
1 EPICOR EAGLE VERIFY ING SECURE DATA BACKUP PA-DSS IMPLEMENTATION GUIDE Epicor Eagle Verifying Secure Data Backup EL8022
2 This manual contains reference information about software products from Epicor Software Corporation. The software described in this manual and the manual itself are furnished under the terms and conditions of a license agreement. The software consists of software options that are separately licensed. It is against the law to copy the software on any medium, or to enable any software options, except as specifically permitted under the license agreement. In addition, no part of this manual may be copied or transmitted in any form or by any means without the prior written permission of Epicor Software Corporation. From time to time, Epicor makes changes to its software products. Therefore, information in this manual is subject to change, and the illustrations and screens that appear in the manual may differ somewhat from the version of the software provided to you. Created by Learning Products and Education Copyright: 2011 Epicor Software Corporation. All rights reserved. Epicor, the Epicor stylized logo design, and Eagle are registered trademarks, and Epicor Eagle is a trademark, of Epicor Software Corporation. All other trademarks are property of their respective owners. Epicor Software Corporation Southfront Road Livermore, CA Document No. EL8022 Publication Date: December 2011 EL8022 Verifying Secure Data Backup 2
3 Table of Contents Introduction... 4 Setting Up the Jobs in Storage Policy Copy Report (JISPC)... 4 Displaying the JISPC Report... 4 Interpreting the JISPC Report... 5 EL8022 Verifying Secure Data Backup 3
4 Introduction Overview of Secure Data Backup (SDBU) Offsite backups are also known as a Secure Data Backup or SDBU, and are scheduled to run automatically on a nightly basis. To verify that a SDBU ran successfully on any given night, you can check the Jobs in Storage Policy Copy Report, which is described in detail in this document. You can run onsite backups and restores on demand, as many times as needed, just as you always could. You will continue to use the exact set of utilities that you have always used for onsite backups (BACKUP, RESTORE, MBC, and Shutdown/SEQ). In MBC, you can turn on or turn off local CD/Tape backups. End-of-Year Procedure Your end-of-year procedure is the same as it was in the past. When you type BACKUP, the system checks the configuration in MBC and then runs a backup accordingly. Typically, the BACKUP command is set up to back up to DVD/tape as well as to the backup appliance; however, if you disabled local backups to tape/dvd and are only running backups to the backup appliance, you may want to set up a DVD/tape backup for the last day of the year for extra protection. Setting Up the Jobs in Storage Policy Copy Report (JISPC) As an Eagle SDBU customer, you are probably already familiar with how to view the status of your most recent local backup using MBC. The Jobs in Storage Policy Copy Report (JISPC) provides information about the subsequent operation that transmits a copy of your backup data to a server in Epicor s Data Center. If you would like to have the option of viewing this daily report, you must inform your Local Platform Specialist (LPS). He or she will in turn notify one of our SDBU backup monitors, who will schedule a daily report to run at 8:30am in your time zone. The report will be automatically downloaded in html format to the local SDBU appliance, and an LPS can assist with creating a shortcut on your PC s desktop that will allow you to display the report each day with the click of a mouse. Displaying the JISPC Report 1. Click the shortcut that your LPS set up on your desktop. 2. When the report index displays, click latest_report.html to view the latest report, or click older reports for a historical perspective. Currently, there are a maximum of 30 reports retained on the SDBU appliance for viewing. EL8022 Verifying Secure Data Backup 4
5 Interpreting the JISPC Report Overview Note that any time stamps reported on the JISPC are always in the Epicor Data Center s time zone, which is Central Time. There are two basic sections on the JISPC report: The top section (Primary Copy) concerns the local backup to the SDBU appliance only, while the bottom section (GlobalDash Copy) concerns the off-site copy only. Interpreting the Local Backup to the SDBU Appliance (Primary Copy) Below is a description of the important columns of the local backup section of the JISPC. Job ID (Status) Every job has a Job ID. A status of (A) is desirable because this means the backup completed successfully and the data is currently available for restore. The D footnote to the (A) means that this data was also deduplicated. Client Any machine that is being backed up has a Client Name. The naming convention for your reports includes your customer account number appended with _eagle. Agent This column illustrates the type of Agent that is used to perform the backup. If the client is an Eagle server, then Linux FS is the Agent. If the client is a Windows PC, the Agent would be Win FS. Backup Type (Cycle/Seq. No) The backup type will be either INCR for incremental or FULL. Your backups are set up on a weekly cycle, and each cycle goes through seven sequence numbers. One FULL backup type will be seen during each cycle. EL8022 Verifying Secure Data Backup 5
6 Start Time/End Time Remember that the start and end times on the report are currently listed in Central time. Size of Application (Compression Rate) The Size of Application (in the example above, the size is 8.41GB) reflects the amount of data that was gathered by the backup agent on the client and transported over the network to the SDBU appliance. This figure will vary daily. On a day where a FULL backup has been performed, the figure will be substantially higher. On days where incremental backups are performed, the figure will in general be lower, because the only data gathered for transport over the network consists of files that have been altered since the prior incremental backup. The compression rate figure reflects the extent to which the data was able to be compressed prior to being deduplicated. The compression operation is important, and compression alone accounts for much of the space savings on the hard disk of the SDBU appliance. In the example above, a compression rate of 29.39% means that after compression, the equivalent of 29.39% of the Size of Application was then passed to the de-duplication engine. In the example above, the equation the system uses is.2939 x 8.41GB = 2.47GB. Thus, 2.47GB was passed to the de-duplication engine. The smaller the Compression Rate percentage, the more effective the compression was. Data Transferred on Network This column reflects how much data was sent over the LAN from the client to the SDBU appliance during the backup operation. Backups may be configured such that data compression takes place at either the client, or at the SDBU appliance itself. Logically, if data compression takes place at the client, then this figure will typically be smaller than the figure in the Size of Application column described earlier. The data was collected, compressed, and then sent across the network to the SDBU appliance. On the other hand, if data compression takes place at the SDBU appliance, then this figure will typically be equivalent to the figure in the Size of Application column. The data was collected, sent across the network to the SDBU appliance, and then compressed. Data Written This figure reflects the amount of data written to disk at the SDBU appliance, after both compression and de-duplication of the data have taken place. Data Verification This column will say Not Picked because this feature is currently not enabled. Retain Data Until A seven day/ one-cycle retention policy is the standard, and that is reflected here. To Be Copied To This column is important, and relates to the off-site copy. Normally, the text Already Copied is what you will see in this column. Already Copied means just what it says: This data was Already Copied off-site. If it hadn t been copied off-site yet, the name of the associated secondary copy, GlobalDash, would appear in the column. Typically, the off-site copy operation should be done by the time this report is run and downloaded to the SDBU appliance, but this will not be true in all cases. If for some reason the Data Written figure of the backup was unusually high, then the off-site copy of all t new, unique data may take a substantial amount of time and still be running as of the next day s business. EL8022 Verifying Secure Data Backup 6
7 Interpreting the Offsite Backup (GlobalDash Copy) Below is a description of the important columns of the offsite backup section of the JISPC. Note that the first 10 columns are identical to the local backup section, and all but the Job ID column contain the exact same information. This is normal. In the Job ID column, note the additional footnote E next to the (A). This means that the data was encrypted, which is correct because the data is encrypted for transmission over the internet to the Epicor Data Center. The Data Written figure in this section would typically be similar, but not exactly identical, to the Data Written figure in the local backup report. The Copied Time indicates the time at which the copy off-site completed. Below is an example of what the JISPC report would look like if it were run AFTER the local backup (Primary Copy) had completed, but BEFORE the off-site (GlobalDash) copy had completed. Note the color coding, which is present on every report. A key for the color coding is located at the bottom of the report screen. Note the following differences between the two sections of the report: In the Primary Copy section, the To Be Copied To column does NOT say Already Copied. In the GlobalDash section, in the Job ID (Status) column, there is an (N), which means the data is Not Available in this copy. Note that the entire row is color-coded differently in the GlobalDash section. The pink coloring also signifies Data Not Available (as per the key at the bottom of the report). EL8022 Verifying Secure Data Backup 7
8 In the GlobalDash section, also note the Data Written value of zero, and the Copied Time is N/A. The Watchdog staff at the Epicor Data Center should be aware of any instance where your off-site copies are behind schedule and advise you accordingly. However, if for some reason you are not contacted and notice this condition yourself over a couple of consecutive days, please open an isupport ticket. EL8022 Verifying Secure Data Backup 8
Epicor Eagle Archiving SDBU Backup Data
EPICOR EAGLE ARCHIVING SDBU BACKUP DATA Epicor Eagle Archiving SDBU Backup Data EL8045 This manual contains reference information about software products from Epicor Software Corporation. The software
Transferring AIS to a different computer
Transferring AIS to a different computer AIS can easily be transferred from one computer to another. There are several different scenarios for transferring AIS to another computer. Since AIS is designed
M Y S E C U R E B A C K U P S E R V E R E D I T I O N. p r o d u c t o v e r v i e w O N L I N E S E R V E R B A C K U P
O N L I N E S E R V E R B A C K U P Business-class Server Backup that allows you to remotely backup a server online. Features advanced compression and de-duplication to speed backups and minimize space.
Using Backup Exec System Recovery's Offsite Copy for disaster recovery
Using Backup Exec System Recovery's Offsite Copy for disaster recovery The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the
Drobo How-To Guide. What You Will Need. Back Up Data from Drobo DAS or SAN Storage to the Cloud Using Carbonite
A great data protection strategy calls for the primary onsite copy to be well protected and for a reliable backup. Local backup copies are great for fast restore, though protecting a small business also
How To Backup An Exchange Server With 25Gb And More On A Microsoft Smartfiler With A Backup From A Backup To A Backup Point Set On A Flash Drive On A Pc Or Macbook Or Ipad On A Cheap Computer (For A
Using SmartFiler for Microsoft Exchange Server Backup Introduction The SmartFiler Backup Appliance Exchange Server backup solution is integrated with the Symantec Backup Exec System Recovery 2010. Using
IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE
White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores
Veeam Cloud Connect. Version 8.0. Administrator Guide
Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be
NetBackup Best Practice Using Tape Storage with Deduplicating Disk Storage
NetBackup Best Practice Using Tape Storage with Deduplicating Disk Storage This document looks at best practices around creating multiple copies of backups on a mixture of tape and deduplicating disk storage.
Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide
Dell Backup Plug-in for Advanced Encryption 2.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
TimeClock Plus User s Guide
TimeClock Plus User s Guide Publication No. EL1016-02 Publication Date: November 2007 This manual contains reference information about software products from Activant Solutions Inc. The software described
Backup and Restore Back to Basics with SQL LiteSpeed
Backup and Restore Back to Basics with SQL December 10, 2002 Written by: Greg Robidoux Edgewood Solutions www.edgewoodsolutions.com 888.788.2444 2 Introduction One of the most important aspects for a database
Section 1: Preface... 1. Introduction... 1 Users... 1 Other Resources... 2 Conventions... 2 Icons... 2 Text... 2
Table of Contents Section 1: Preface........................................... 1 Introduction............................................................. 1 Users...................................................................
Kaseya 2. User Guide. Version 7.0. English
Kaseya 2 Backup User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated
VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014
VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of
VMware vsphere Data Protection
VMware vsphere Data Protection Replication Target TECHNICAL WHITEPAPER 1 Table of Contents Executive Summary... 3 VDP Identities... 3 vsphere Data Protection Replication Target Identity (VDP-RT)... 3 Replication
NSave Table of Contents
NSave Table of Contents Introduction to NSave for Desktops 2 CPP Installation Instructions 3 Backing up your Computer 8 Restoring Files to your Computer 10 Settings 13 History 14 Destinations 15 1 Introduction
Altaro Hyper-V Backup
Altaro Hyper-V Backup An Introduction [email protected] www.altaro.com An Introduction Contents What we'll be covering... Product Overview Installation Configuring and Managing your Backups Backing up VMs
Version 4.61 or Later. Copyright 2013 Interactive Financial Solutions, Inc. All Rights Reserved. ProviderPro Network Administration Guide.
Version 4.61 or Later Copyright 2013 Interactive Financial Solutions, Inc. All Rights Reserved. ProviderPro Network Administration Guide. This manual, as well as the software described in it, is furnished
DigiDelivery Client Quick Start
DigiDelivery Client Quick Start Installing the DigiDelivery Client To download and install the DigiDelivery client software: 1 Launch your Web browser and navigate to www.digidesign.com/digidelivery/clients.
User Guide. Nero BackItUp. Ahead Software AG
User Guide Nero BackItUp Ahead Software AG Information on copyright and trade marks The Nero BackItUp user manual and all its contents are protected by copyright and are the property of Ahead Software.
Call Recorder Quick CD Access System
Call Recorder Quick CD Access System V4.0 VC2010 Contents 1 Call Recorder Quick CD Access System... 3 1.1 Install the software...4 1.2 Start...4 1.3 View recordings on CD...5 1.4 Create an archive on Hard
Symantec Backup Exec.cloud
Automatic, continuous, and secure protection that backs up data to the cloud, or via a hybrid approach combining on-premise and cloud-based backup. Data Sheet: Symantec.cloud Only 21 percent of SMBs are
Xythos on Demand Quick Start Guide For Xythos Drive
Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document
DocAve 4.1 Backup User Guide
September 2007 DocAve 4.1 Backup User Guide Additional user guides available at http://www.avepoint.com/support AvePoint DocAve TM 4.1 Enterprise Backup User Guide 1 Copyright 2001-2007 AvePoint, Inc.
Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization.
WHITE PAPER: CLOUD, APPLIANCE, OR SOFTWARE?........................................ Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Who should read
AdminToys Suite. Installation & Setup Guide
AdminToys Suite Installation & Setup Guide Copyright 2008-2009 Lovelysoft. All Rights Reserved. Information in this document is subject to change without prior notice. Certain names of program products
How to Plan for Disaster Recovery
ImproMed LLC How to Plan for Disaster Recovery Revised January 27, 2015 2015 ImproMed, LLC. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
Updates Click to check for a newer version of the CD Press next and confirm the disc burner selection before pressing finish.
Backup. If your computer refuses to boot or load Windows or if you are trying to restore an image to a partition the Reflect cannot lock (See here), and then you will have to start your PC using a rescue
Getting Started with StoreGrid Cloud
Getting Started with StoreGrid Cloud This document describes the steps to quickly sign up and start backing up your data to StoreGrid Cloud. I. Signing Up 1. Go to http://storegridcloud.vembu.com and select
TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE SINGAPORE
TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE SINGAPORE WELCOME TO TELSTRA CLOUD SERVICES Our cloud infrastructure solutions are made up of a combination of scalable cloud resources, including
Understanding BitBackup
Remote Backup Systems, Inc. Online Backup Software Overview Understanding BitBackup BitBackup technology is included in version 9.0 and greater of the RBackup client software. When enabled, this technology
ReadyRECOVER. Reviewer s Guide. A joint backup solution between NETGEAR ReadyDATA and StorageCraft ShadowProtect
ReadyRECOVER Reviewer s Guide A joint backup solution between NETGEAR ReadyDATA and StorageCraft ShadowProtect Table of Contents NETGEAR Contact Info... 3 Product Category... 3 Overview... 3 ReadyRECOVER...
Backup & Disaster Recovery Options
Backup & Disaster Recovery Options Since businesses have become more dependent on their internal computing capability, they are increasingly concerned about recovering from equipment failure, human error,
Software Distribution Reference
www.novell.com/documentation Software Distribution Reference ZENworks 11 Support Pack 3 July 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use
CrashPlan PRO Enterprise Backup
CrashPlan PRO Enterprise Backup People Friendly, Enterprise Tough CrashPlan PRO is a high performance, cross-platform backup solution that provides continuous protection onsite, offsite, and online for
VMware vsphere Data Protection 6.0
VMware vsphere Data Protection 6.0 TECHNICAL OVERVIEW REVISED FEBRUARY 2015 Table of Contents Introduction.... 3 Architectural Overview... 4 Deployment and Configuration.... 5 Backup.... 6 Application
Fixed Destinations. BackupAssist Quick-Start Guide for. BackupAssist installation, configuration and setup. www.backupassist.com.
BackupAssist Quick-Start Guide for Fixed Destinations BackupAssist installation, configuration and setup Contents 1.1 Introduction... 2 2.1 Before you begin... 2 Applies to Local directory 3.1 Installation...
Upgrading VMware Identity Manager Connector
Upgrading VMware Identity Manager Connector VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
NAS 254 Cloud Backup. Use Cloud Backup to backup your data to Amazon S3 A S U S T O R C O L L E G E
NAS 254 Cloud Backup Use Cloud Backup to backup your data to Amazon S3 A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Have a basic understanding
Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide
Acronis Backup & Recovery 10 Advanced Server Virtual Edition Quick Start Guide Table of contents 1 Main components...3 2 License server...3 3 Supported operating systems...3 3.1 Agents... 3 3.2 License
DOCUMENTATION SHADOWPROTECT - MICROSOFT WINDOWS SYSTEM BACKUP AND RESTORE OPERATIONS
DOCUMENTATION SHADOWPROTECT - MICROSOFT WINDOWS SYSTEM BACKUP AND RESTORE OPERATIONS Copyright Notice The use and copying of this product is subject to a license agreement. Any other use is prohibited.
Networking Best Practices Guide. Version 6.5
Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form
SonicWALL CDP Local Archiving
This document describes how to configure, implement, and manage a local archive for your SonicWALL CDP appliance. It contains the following sections: Feature Overview section on page 1 Using Local Archiving
How To Backup A Database In Navision
Making Database Backups in Microsoft Business Solutions Navision MAKING DATABASE BACKUPS IN MICROSOFT BUSINESS SOLUTIONS NAVISION DISCLAIMER This material is for informational purposes only. Microsoft
Barracuda Backup Vx. Virtual Appliance Deployment. White Paper
Barracuda Backup Vx Virtual Appliance Deployment White Paper DOCUMENT SCOPE This document provides guidance and best practices on designing and deploying Barracuda Backup Vx Virtual Appliance on VMware
SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore
SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore Document Scope This solutions document describes how to configure and use the Microsoft Exchange InfoStore Backup and Restore feature in
Improve Backup Performance by Upgrading to Symantec Backup Exec 12.5 with Service Pack 2
Improve Backup Performance by Upgrading to Symantec Backup Exec 12.5 with Service Pack 2 Test Report to Show How Existing Backup Exec Customers Can Improve Backup Performance and Reduce Backup Windows
Storage Guardian Remote Backup Restore and Archive Services
Storage Guardian Remote Backup Restore and Archive Services Storage Guardian is the unique alternative to traditional backup methods, replacing conventional tapebased backup systems with a fully automated,
Extended Data Life Management:
TECHNOLOGY BRIEF Extended Data Life Management: Protecting Data Over Long Periods of Time NOTICE This Technology Brief may contain proprietary information protected by copyright. Information in this Technology
How To Protect Your Data From Being Damaged On Vsphere Vdp Vdpa Vdpo Vdprod (Vmware) Vsphera Vdpower Vdpl (Vmos) Vdper (Vmom
VMware vsphere Data Protection 6.0 Maciej Kot Senior Systems Engineer VMware Overview vsphere Data Protection Overview Data protection for VMs and applications Agent-less VM backup and restore Agents for
Installation and Setup: Setup Wizard Account Information
Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account
EaseUS Todo Backup user guide. EaseUS Todo Backup. Central Management Console. User guide - 1 -
EaseUS Todo Backup Central Management Console User guide - 1 - Table of Contents Welcome... - 3 - Overview... - 3 - How to use this manual... - 3 - Getting started... - 4 - Hardware requirements... - 4
Acronis Backup & Recovery 11.5 Quick Start Guide
Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server
Exchange Server 2010 & C2C ArchiveOne A Feature Comparison for Email Archiving
Email Archiving is critical for performance of storage, disaster recovery, compliance, litigation support and business continuity. While Exchange 2010 offers basic Email Archiving, an enhanced solution
CTERA Agent for Linux
User Guide CTERA Agent for Linux September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
DATA BACKUP & RESTORE
DATA BACKUP & RESTORE Verizon Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable. Offsite backup is
Instant Recovery for VMware
NETBACKUP 7.6 FEATURE BRIEFING INSTANT RECOVERY FOR VMWARE NetBackup 7.6 Feature Briefing Instant Recovery for VMware Version number: 1.0 Issue date: 2 nd August 2013 This document describes a feature
BDR for ShadowProtect Solution Guide and Best Practices
BDR for ShadowProtect Solution Guide and Best Practices Updated September 2015 - i - Table of Contents Process Overview... 3 1. Assess backup requirements... 4 2. Provision accounts... 4 3. Install ShadowProtect...
Please note that after installation, you can configure the backup, but no backup files will be created until the Server / PC has been restarted.
How to Configure Shadow Protect and Image Manager with our Cloud Service This guide will walk you through installation of Shadow Protect (SP) and Image Manager (IM), ready to send Offsite to our Cloud
ACTIVANT B2B SELLER B2B SELLER NEW FEATURES GUIDE VERSION 5.8
ACTIVANT B2B SELLER B2B SELLER NEW FEATURES GUIDE VERSION 5.8 This manual contains reference information about software products from Activant Solutions Inc. The software described in this manual and the
Understanding EMC Avamar with EMC Data Protection Advisor
Understanding EMC Avamar with EMC Data Protection Advisor Applied Technology Abstract EMC Data Protection Advisor provides a comprehensive set of features that reduce the complexity of managing data protection
SmartFiler Backup Appliance User Guide 2.0
SmartFiler Backup Appliance User Guide 2.0 SmartFiler Backup Appliance User Guide 1 Table of Contents Overview... 5 Solution Overview... 5 SmartFiler Backup Appliance Overview... 5 Getting Started... 7
USER GUIDE CLOUDME FOR WD SENTINEL
USER GUIDE CLOUDME FOR WD SENTINEL Document 2013-11-17 Page 2 of 13 TABLE OF CONTENTS INTRODUCTION 2 Safe European Storage 2 How does this really work? 2 GETTING STARTED 3 Setting up an account 3 Setting
How To Use Ackup On Ackups On A Cell Phone Or Ipad Or Ipa 2.3.3 (Ackup) On A Pc Or Ipam 2.5 (Aqb) On An Iphone
User Guide MAS v3.0 Motorola Automated ackup System MOTOROLA and the Stylized M logo are trademarks or registered trademarks of Motorola Trademark Holdings, LLC. Firefox and the Firefox logos are trademarks
Data Backup and Restore (DBR) Overview... 2. Detailed Description... 3. Pricing... 5 SLAs... 5 Service Matrix... 6. Service Description
Service Description Data Backup and Restore (DBR) Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable.
Features Security. File Versioning. Intuitive User Interface. Fast and efficient Backups
IBackup Professional provides a secure, efficient, reliable, cost effective and easy to use Internet based backup solution with additional emphasis on security and data retention. IBackup Professional
Comprehensive VMware Virtual Machine Protection with Asigra Cloud Backup TM
Comprehensive VMware Virtual Machine Protection with Asigra Cloud Backup TM Virtualization is changing the way companies design, run, and manage their IT environments. Today, virtual machines (VM) are
Novell ZENworks 10 Configuration Management SP3
AUTHORIZED DOCUMENTATION Software Distribution Reference Novell ZENworks 10 Configuration Management SP3 10.3 November 17, 2011 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties
Symantec NetBackup OpenStorage Solutions Guide for Disk
Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a
How To Backup A Virtualized Environment
Disk-based Backup for Virtualized Environment via Infortrend EonStor DS, ESVA, EonNAS 3000 / 5000 and Veeam Backup and Replication Application Note Abstract The document describes, as an example the usage
Cloud Storage Backup for Storage as a Service with AT&T
WHITE PAPER: CLOUD STORAGE BACKUP FOR STORAGE AS A SERVICE........ WITH..... AT&T........................... Cloud Storage Backup for Storage as a Service with AT&T Who should read this paper Customers,
Title Goes ASSET MANAGEMENT
Title Goes ASSET MANAGEMENT MAXIMIZING UPTIME: BUILDING A FAULT-TOLERANT FACTORYTALK ASSETCENTRE SYSTEM ASSET MANAGEMENT Introduction FactoryTalk AssetCentre software has proven to be the industry standard
Symantec Backup Exec 11d for Windows Small Business Server
Symantec Backup Exec 11d for Windows Small Business Server End-User Call Script for Sales This document is intended as a simple call structure to help get you started when selling Backup Exec 11d for Windows
1 of 10 1/31/2014 4:08 PM
1 of 10 1/31/2014 4:08 PM copyright 2014 How to backup Microsoft SQL Server with Nordic Backup Pro Before creating a SQL backup set within Nordic Backup Pro it is first necessary to verify that the settings
Backup Exec 2014: Protecting Microsoft SQL
TECHNICAL BRIEF: BACKUP EXEC 2014: PROTECTING MICROSOFT SQL........................................ Backup Exec 2014: Protecting Microsoft SQL Who should read this paper Technical White Papers are designed
efolder BDR for Veeam Cloud Connection Guide
efolder BDR for Veeam Cloud Connection Guide Setup Connect Preload Data uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder Cloud for Veeam. Using the efolder Cloud
Creating a Complete Backup of Shelby v5 Data
Creating a Complete Backup of Shelby v5 Data Backup the Shelby folder and all its contents Since the Shelby v5 software now stores information in the \Shelby\ssv5.dat folder as well as in the SQL database;
InventoryControl for use with QuoteWerks Quick Start Guide
InventoryControl for use with QuoteWerks Quick Start Guide Copyright 2013 Wasp Barcode Technologies 1400 10 th St. Plano, TX 75074 All Rights Reserved STATEMENTS IN THIS DOCUMENT REGARDING THIRD PARTY
Yosemite Server Backup User s Guide
Yosemite Server Backup User s Guide Part number: First edition: October 2010 Legal and notice information Copyright 2004, 2012 Barracuda Networks, Inc. Under copyright laws, the contents of this document
Barracuda Backup for Managed Services Providers Barracuda makes it easy and profitable. White Paper
Barracuda Backup for Managed Services Providers Barracuda makes it easy and profitable White Paper Barracuda Backup for Managed Service Providers Managed service providers (MSPs) need to ensure that they
Product Brief. DC-Protect. Content based backup and recovery solution. By DATACENTERTECHNOLOGIES
Product Brief DC-Protect Content based backup and recovery solution By DATACENTERTECHNOLOGIES 2002 DATACENTERTECHNOLOGIES N.V. All rights reserved. This document contains information proprietary and confidential
Cloud Backup Service Service Description. PRECICOM Cloud Hosted Services
Cloud Backup Service Service Description PRECICOM Cloud Hosted Services Table of Contents Table of Contents 2 1. Cloud Backup Service Service Summary 3 2. Cloud Backup Service Service Definition 4 2.1.
Installation Instructions Release Version 15.0 January 30 th, 2011
Release Version 15.0 January 30 th, 2011 ARGUS Software: ARGUS Valuation - DCF The contents of this document are considered proprietary by ARGUS Software, the information enclosed and any portion thereof
PC Proactive Solutions Technical View
PC Proactive Solutions Technical View PC Proactive Solutions Technicians View The following pages briefly describe our technicians view of our proactive management utility. Our software application is
Universal Backup Device The Essential Facts of UBD
Information Technology Solution Brief Universal Backup Device The Essential Facts of UBD Fibre Channel Disk to Disk Backup for IBM Power Systems Copyright (c)2014 Electronic Storage Corporation Information
MadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
Using Symantec NetBackup with Symantec Security Information Manager 4.5
Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager Legal Notice Copyright 2007 Symantec Corporation. All rights
Event Center (rev b) EVENT CENTER. VPI 160 Camino Ruiz, Camarillo, CA 93012-6700 (Voice) 800-200-5430 805-389-5200 (Fax) 805-389-5202 www.vpi-corp.
EVENT CENTER 1 VPI 160 Camino Ruiz, Camarillo, CA 93012-6700 (Voice) 800-200-5430 805-389-5200 (Fax) 805-389-5202 www.vpi-corp.com All information in this manual is Copyright protected material by Voice
Yosemite Server Backup Installation Guide
Yosemite Server Backup Installation Guide Part number: First edition: October, 2010 Legal and notice information Copyright 2004, 2012 Barracuda Networks, Inc. Under copyright laws, the contents of this
Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide
Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec
Service Level Agreement (SLA) Arcplace Backup Enterprise Service
(SLA) Arcplace Backup Enterprise Service 1. Introduction This Service Level Agreement ( SLA ) forms an integral part of the Agreement between Arcplace and Customer. This SLA describes the Backup Enterprise
Version: 1.5 2014 Page 1 of 5
Version: 1.5 2014 Page 1 of 5 1.0 Overview A backup policy is similar to an insurance policy it provides the last line of defense against data loss and is sometimes the only way to recover from a hardware
1. Product Information
ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such
Adaptive Server Enterprise
Using Backup Server with IBM Tivoli Storage Manager Adaptive Server Enterprise 15.7 DOCUMENT ID: DC01176-01-1570-01 LAST REVISED: September 2011 Copyright 2011 by Sybase, Inc. All rights reserved. This
Online Backup Client User Manual Linux
Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based
