1 We take care of backup and recovery so you can take care of your business. INTRODUCING: HOSTED BACKUP
2 RecoveryVault Hosted Backup allows Rico Teles at Sephaku Holdings to ensure recovery of all mission critical data. Combined with McAfee SaaS Continuity, Sephaku Holdings can continue operating even in the event of an IT disaster. RecoveryVault offers backup efficiencies unavailable with traditional backup architecture and is an end-to-end hosted backup and recovery solution for servers, desktops, laptops and applications. More than just a Server Backup Compliment your RecoveryVault solution with McAfee SaaS Services Continuity Complete your business disaster recovery capability with our Continuity solution. Continuity ensures uninterrupted communication with your staff and customers while Recovery Vault restores your business mission critical data. For more information on Hosted McAfee Services and Continuity, visit globalmicro.co.za/mcafee Backing Up has its Challenges RecoveryVault is designed to offer efficiencies of hosted Backup unavailable with traditional backup architecture and reduces the amount of backup assets to manage and maintain. Backing up is a thankless job and is often associated with a high failure rate. Few IT pros acknowledge any know-how or experience to back up servers and will rarely volunteer for the job. Focus on recovery Backing up data is a means to an end. Data protection should focus on both recovery and backing up. Share our two decades of experience and data stewardship best practice. Hosted Backup ensures restorability of data, whether you lose a file, disk, machine or the entire facility. Pay for less storage with Data Deduplication, Compression and encryption. Archiving old data to cheaper storage. Address every hosted backup scenario with Continuous Data Protection, Local and off-site backup, Laptop protection and support for heterogeneous environments. Hosted Backup Is Efficient RecoveryVault is a holistic solution that encompasses traditional and innovative technologies on a common platform, protecting for recovery and backup of servers, laptops and data centres. Eliminate the need to manage multiple point solutions Single turnkey software to install, manage and upgrade, eliminating the need to manage numerous hosted backup solutions. Automatic upgrades there is no timeconsuming pushing of agents or updates out to thousands of remote sites, servers and applications.
3 HOSTED BACKUP Laptop Protection Agentless remote backup & recovery protection for PCs & laptops. HOSTED BACKUP Disaster Recovery Protection The importance of protecting an organisation s data and IT infrastructure in the event of a disruptive situation has become an increasing and more visible business priority in recent years. Laptops Need Protection Users still store critical data on their PCs and laptops. Information not on the server is not backed up. Managing a remote backup of every desktop or laptop machine, every day, manually is virtually impossible. Traditional tape backup requires an ever increasing investment in time, training, technology and supplies. Some so-called remote backup solutions exist, but they re complex, costly, inefficient and bandwidth intensive. You Cannot Rely On Your Users Industry research has shown that users cannot be relied upon to back up their data consistently. Companies are exposed to considerable risk from irreparable data loss or lengthy recoveries. Adding to these challenges is the fact that remote backup applications for laptop users often require continuous maintenance and support such as administering backup jobs and restoring lost files. Recoveryvault Is The Solution! RecoveryVault provides remote backup facilities unavailable with traditional backup architecture by allowing you to: manage your desktops and laptops using agentless remote backup technology. Backup to local or remote repositories. restore deleted files yourself or restore data through administrators from a central location. Statistics Never Lie Information technology has become increasingly more critical to the continuation of business critical functions. Of companies that had a major loss of business data: 43% never reopen. 51% close within two years. Only 6% will survive long-term. Data Replication Enterprises may need to store a second instance of the backed up data in another geographical location. A second DS-System can reside in a different geographical location and can receive backed up data from the production DS-System. The Replication DS-System may be used as a failover DS-System. Benefits Replicating Online Storage between two or more DS- Systems offers many benefits, such as: Redundancy, with multiple working copies (secondary backups) of the DS-System Online Storage. High availability, with DS-Clients able to switch from a failed DS-System to a Replication DS System immediately. After experiencing the loss of valuable data from our accounting business, we realised how important it is to make sure we can actually recover lost information that is backed up. ALKA DESAUR A DESAUR & CO. FOUNDER
4 Hosted Backup and McAfee Encryption give Ingo Mutinelli of Elvey Security Technologies complete peace of mind. Remove the business risk of server failure and data loss. RecoveryVault guarantees complete restorability from either of two encrypted off-site data centres. McAfee Encryption guarantees that all data transversals the internet remains encrypted and secure. HOSTED BACKUP Virtual Server Protection Virtual server backup and recovery protection. McAfee Encryption Hosted Backup features military grade encryption. But what about data leaving your environment? McAfee Encryption secures your communication over the internet. For more information, visit globalmicro.co.za/mcafee Virtual Server Challenges Traditional agent-based backup and recovery force the enterprise into a series of unattractive choices. Agent-based technologies pollute virtual server environments. Agents, by their nature, lack cohesion. The need to physically install and manage agents on each application within the virtual server and each machine is time and labour intensive. A single agent adds as much as 16% server overhead to each application. Add to that the security risk and cost of each agent and it becomes quite clear: agent- based backup and recovery dramatically impacts the TCO and performance of the virtual server environment. Virtual Server Data Protection RecoveryVault removes the traditional hassles associated with the protection and recovery of data on virtual servers by: Discovering each new guest virtual server. Centralising backup configuration and management. Controlling software licensing costs. Minimising initial backup job configuration and ongoing management. Providing multiple backup options. Providing backup options specific to VMWare, Xen & HyperV. Broadening application and operating system support. Virtual Server Auto-Discovery RecoveryVault addresses the new corporate challenges around discovery and configuration. RecoveryVault can automatically discover a new guest virtual server on individual host servers as the guest virtual server is created. Obtaining information about a guest virtual server on each host server automatically, enables RecoveryVault to track the movement of the guest virtual server from one host server to another. Guest virtual servers continue to receive uninterrupted data protection regardless of which host server they reside on. Have the peace of mind that even if your server fails and wipes all the data, you can immediately begin remotely restoring all of the information to your systems from any location to which it is safely backed up every day.
5 HOSTED BACKUP Security HOSTED BACKUP Options Unique Hosted Backup security. Flexible solutions for agile businesses. Encryption Compliance Backup Lifecycle LAN Discovery RecoveryVault encrypts the data in flight and at rest from cradle to grave. It is the only data protection solution that is certified for government departments or regulated industries to collect, store and transfer their backup data. Encrypted at rest and on the move from Source to Disk, while in Transit and in Archive. Data destroyed based on policy with certificate of destruction. Encryption Key Safeguarding RecoveryVault includes an important option that securely and safely manages the encryption keys. Using this feature, customers can securely send and store an encryption key for safe storage in the Data Centre vault without risk of compromising the encryption key. This gives them the option to recover data in the event of a disaster without first needing to locate and produce the encryption key. Highest Pedigree RecoveryVault assures secure backup and recovery: Zero breaches or compromised systems in over 20 years of operation. No open firewall ports. Cannot be hacked. Data stored in compressed and encrypted format. Digital signature for every file and block of data. Data on disk in self-describing format. Background Autonomic Healing. Password Management Organisations that are extremely security conscious may also want to take advantage of password management. This gives them the option to automatically generate passwords and change them at random for specific backup user accounts, so there is no unauthorised access to the account or the data. RecoveryVault can help your business with a variety of compliance issues: Disk-based, automated solution that runs quietly in the background with no manual intervention tape backups require manual intervention and are therefore not compliant with regulations like HIPPA and Gram-Leach-Bliley. Aggregates all backup data and allows for immediate recovery. Sarbanes-Oxley Legislation SOX Act legislates how and for how long companies must store their financial records. SOX safeguards against illegal financial activities by specifically stating that electronic records and messages, including and instant messages, must be saved for at least five years and must be easily accessible. RecoveryVault addresses SOX rules by keeping critical data secure, yet easily accessible. The information is transmitted and stored in encrypted format, and remains in an encrypted vault where it is protected from unauthorised access or destruction. THE ONLY AGENTLESS BACKUP TECHNOLOGY TO BE FIPS CERTIFIED FIPS is the most current security requirement for cryptographic modules, or encryption. Backup Lifecycle Management ( BLM ) relates to our long-term data retention functionality that provides: cost-effective, long-term data storage. search facilities for retained backup data (data indexing). easy restoration of older backup data. functionality to manage backup data destruction. Blm Frees Up Storage BLM can free up the DS-System Online Storage space that is occupied by stale backup data thereby reducing the cost of protecting inactive files. BLM handles moving or copying of data from the on-line storage to Archive. The transfer of data from the source to the DS-System (and keeping a local copy if configured) is not changed by the BLM retention process. Businesses are expected to be able to continue running the business in the event of an emergency, which means that your IT systems need to do the same. The fast and reliable software and service from RecoveryVault and Backup Technology respectively will enable you to achieve and exceed this requirement. This tool identifies different tiers of data and how many versions of the data should be kept on-line. The report templates include: Shared usage, largest files, largest duplicates and ownership. File type distribution, partition size. Access report, dormant files. Growth and modified files. SQL server size and Exchange server size. Using the LAN Storage Discovery module helps you: Increase server availability and performance. Isolate storage issues before conducting a costly backup. Reduce backup window time. Optimise network disk space. Determine which files/folders/shares to back-up. Local Storage This module addresses the need for rapid, seamless business continuity. It stores a copy of the latest generation or multiple generations of a backup set on the local LAN. This ensures that relevant backup sets are always available for immediate restoration at LAN speed from an individual file version to a complete system restore. Synchronisation You can choose whether or not to synchronise the local storage contents with the DS-Client database and with DS-System Online Storage. This synchronisation ensures that files from local storage are reflected in the records of the DS Client database, and that they are also stored in the DS-System Online Storage.
6 HOSTED BACKUP Benefits Get the most from SA s leading Hosted Backup & recovery solution. Which hosted backup edition is right for me? Capture Less LAN Storage Discovery identifies storage inefficiencies like stale or redundant data. Industry leading data reduction technologies like incremental forever, common file elimination, compression and single-instance storage save you money every day. Ingest Less Global deduplication at the source and at the target side. WAN bandwidth optimisation and storage capacity optimisation for unprecedented backup and storage efficiencies. Manage Less Autonomic healing technology addresses the problems of file corruption and increases the integrity of backed up data. Years ago, we treated all data as being equal. All data originated on one type of storage and stayed there until deleted. We now understand that not all information is treated equally. Some types of data are more important than others, or accessed more frequently than others. Pay Less RecoveryVault is billed based on compressed, deduped capacity. Easy to budget monthly fees. Charges are the same irrespective of the number of protected systems, locations and remote users. Store Less RecoveryVault allows you to set up data retention policies at each step of the backup data workflow and life-cycle. Delete technology allows you to reclaim and reuse storage resources. Pain Less RecoveryVault is built around an agentless architecture so that you experience no operating system and application disruption or downtime for implementation or upgrades; no security risk because of an open agent port that can be hacked. Mundane Less RecoveryVault architecture is built around transferring data to a remote location. Organisations can leverage a public cloud infrastructure or use the company s private cloud to optimise backing up and recovery of data centres, central offices, distributed branch and remote locations, virtual machines and mobile users. Contact us EDITION Target Market Encryption EXPRESS RECOVERYVAULT EXPRESS WINDOWS, MAC OS, SQL, MYSQL AND EXCHANGE 50 workstations and 5 servers 256 Bit Encryption STANDARD RECOVERYVAULT BACKS UP OVER 80 DIFFERENT PLATFORMS INCLUDING WINDOWS FILES UNIX, SQL, MYSQL AND VMWARE More than 50 workstations or 5 servers 256 Bit Encryption FIPS 150 Certification HIPPA Gram-Leach Billey De-Duplication No Yes Compression Yes Yes Agentless Requires Agent Yes Local and Data Centre Storage Long Term Storage globalmicro.co.za E T 0861 GLOBAL (456225) Data Centre Only No Local and Data Centre Storage Yes (only available on RecoveryVault Enterprise edition)
Why Cloud Backup/Recovery (Private, Public, or Hybrid) WILL be Your Data Protection. Marc Staimer, President and CDS of Dragon Slayer Consulting Marc s consulting practice of 11+ years provides consulting
IBM Software Thought Leadership White Paper June 2012 Enable and protect business-ready cloud infrastructures IBM Tivoli Storage Manager and Front-safe Portal enable security-rich, cloud-based data protection
Online Backup White Paper The Dollars and Sense of Online Backup Table of Contents Executive Summary...3 IT Challenges: It s ugly out there...3 The problem with tape...4 Now is the time for online backup...5
Microsoft Corporation and HP Using Network Attached Storage for Reliable Backup and Recovery Microsoft Corporation Published: March 2010 Abstract Tape-based backup and restore technology has for decades
HYBRID CLOUD BACKUP 101 Top Five Benefits of Cloud-Connected Appliances Hybrid cloud backup solutions will grow at a compounded average a growth rate of more than 80%. TANEJA GROUP 02 Introduction Most
THE BENEFITS OF CLOUD NETWORKING 1 White Paper The Benefits of Cloud Networking Enable cloud networking to lower IT costs & boost IT productivity 2 THE BENEFITS OF CLOUD NETWORKING Table of Contents Introduction
Cloud Computing A Small Business Guide. Whilst more and more small businesses are adopting Cloud Computing services, it is fair to say that most small businesses are still unsure of what Cloud Computing
PARTNER BRIEF: IS ONLINE BACKUP RIGHT FOR YOUR BUSINESS?........................................ Is online backup right for your business? Eight reasons to consider protecting your data with a hybrid Who
THE INTERNET DATA VAULT From enterprise-sized corporations, to simple home-based businesses, all companies have information that is important to their success and that needs to be protected. Data storage
Introduction Silverton Consulting, Inc. StorInt Briefing All too often in today s SMB data centers the overall backup and recovery process, including both its software and hardware components, is given
SOLUTION PROFILE HYBRID CLOUD STORAGE FROM MICROSOFT: LEVERAGING WINDOWS AZURE AND STORSIMPLE AUGUST 2013 Cloud computing does some things very well. It delivers applications and upgrades. It runs analysis
Combining Onsite and Cloud Backup How businesses of all sizes can protect growing volumes of data and their bottom line Copyright Acronis, Inc., 2002 2012 ompanies of all sizes are dealing with large and
Improving Business for SMEs with Online Backup www.cloudsecure.co.uk/cloudsecure 1 Accountants and Solicitors Firms Professional organisations such as accountancy and solicitors firms have an ever increasing
Solutions Guide for Data-At-Rest - 2 - SSIF Guide to Data-At-Rest Solutions Table of Contents Introduction... 5 Why Should You Encrypt Your Data?... 6 Threat Model for Data-at-Rest... 7 Encryption Strength...
Best Practices for Cloud-Based Information Governance Autonomy White Paper Index Introduction 1 Evaluating Cloud Deployment 1 Public versus Private Clouds 2 Better Management of Resources 2 Overall Cloud
WHITE PAPER: CA ARCserve Backup Network Data Management Protocol (NDMP) Network Attached Storage (NAS) Option: Integrated Protection for Heterogeneous NAS Environments CA ARCserve Backup: Protecting heterogeneous
Five Hosted VoIP Features WHITEPAPER: hosted exchange BUYER S GUIDE www.megapath.com executive summary The adoption of cloud-based hosted services is gaining momentum among businesses interested in reducing
Firewall Strategies June 2003 (Updated May 2009) 1 Table of Content Executive Summary...4 Brief survey of firewall concepts...4 What is the problem?...4 What is a firewall?...4 What skills are necessary
Corporate Enterprise Data Protection Package Enterprise-Level Disaster Recovery Remote and Branch-Office Protection Employee Laptops and Remote Devices Who We are Since 2003, KeepItSafe has provided large-enterprise
With hundreds of Help Desk software packages available, how do you choose the best one for your company? When conducting an Internet search, how do you wade through the overwhelming results? The answer
Pros 4 Technology Online Backup Features Introduction Computers are the default storage medium for most businesses and virtually all home users. Because portable media is quickly becoming an outdated and
EMC Backup and Recovery Solutions Use Cases and Quick Selling Guides Leveraging g best-in-class deduplication solutions for next-generation backup May 2011 Copyright 2011 EMC Corporation. All rights reserved.
ATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V WHITE PAPER Solve Data Protection and Security Issues Amid
white paper Public or Private Cloud: The Choice is Yours Current Cloudy Situation Facing Businesses There is no debate that most businesses are adopting cloud services at a rapid pace. In fact, a recent
Moving to the Cloud: What Every CIO Should Know CONTACT SALES US: 1.877.734.6983 UK: +44 (0)845.528.0588 www.egnyte.com WHITEPAPER Overview Enterprise data storage needs are growing exponentially, doubling
Frequently Asked Questions about Cloud and Online Backup With more companies realizing the importance of protecting their mission-critical data, we know that businesses are also evaluating the resiliency
CYBER SECURITY OPERATIONS CENTRE APRIL 2011, UPDATED SEPTEMBER 2012 Cloud Computing Security Considerations Table of Contents Cloud Computing Security Considerations... 3 Overview of Cloud Computing...