Agent-less remote backup & recovery protection for PCs & laptops

One offsite location where backup copies of data are held is often not enough for customers, but two sites means total peace of mind. They can then go ahead and delete their data from their on-site infrastructure, safe in the knowledge that no backup data will be lost.

Total Protection for Workstations

Users generally only store important data on their laptops and PC’s, which means it is not ever backed up.

  • It simply isn’t possible to manually backup every computer and laptop remotely every single day.
  • Using traditional tape methods to backup data is costly and time consuming. It also requires a high level of training.
  • There are remote backup solutions out there, but they are hard to manage, bandwidth intensive, and a huge drain on the budget.

Users Cannot Be Totally Relied Upon

Research has shown time and again that users cannot be relied upon to backup data on a regular basis.

  • Relying on users means exposing your company to potentially crippling data losses or long recovery times.
  • It also doesn’t help that remote backup solutions for laptops need round the clock maintenance and support. Restoring lost files and administering backup jobs are just a couple of tasks that need constant attention.

RecoveryVault is the solution!

With RecoveryVault you get remote backup solutions that are not available with other methods, and these include:

  • The ability to scale up or down as required.
  • Manage all of the laptops and PC’s in your company remotely without ever having to use an agent.
  • Backup as many as 80 different platforms without having to shell out extra for plug-ins and installation.
  • Backup locally, or to remote repositories.

RecoveryVault backs up over 80 different platforms with platform being, Virtual servers!

Many customers opt for this edition when they are concerned with the possibility of a 16% performance overhead of agent based backup, all of which leads to a smaller number of VM’s per server.

Virtual server challenges

An enterprise is forced to make difficult choices when they decide to settle for an agent-based backup and recovery service.

  • Virtual server environments become polluted when agent based technologies are used.
  • Agents generally don’t deliver much in the way of cohesion.
  • It takes altogether too much time and resources to physically install and manage agents on every single application you use.
  • Server overhead can increase by as much as 16% with a single agent.
  • All of this, and we haven’t yet even discussed the cost of each agent and the security risk involved. It’s clear to see that agent based backup and recovery has an overall negative effect on the virtual server environment.

Virtual server data protection

The hassles that come with protection and recovery are removed by RecoveryVault because of the following:

  • Discovering each new guest virtual server.
  • Centralizing backup configuration and management.
  • Controlling software licensing costs.
  • Minimizing initial backup job configuration and on-going management.
  • Providing multiple backup options.
  • Providing backup options specific to VMWare, Xen & HyperV.
  • Broad application and operating system support.

Virtual server auto-discovery

Discovery and configuration are new corporate challenges addressed by RecoveryVault.

  • While the guest virtual server is being created, VirtualRecovery will automatically recognize it on the individual host servers.
  • With this information on hand, RecoveryVault is then able to gather information about the guest virtual server, whilst also tracking all movements from one host server to another.
  • No matter which host server they reside on, guest virtual servers will receive continuous data protection.

Hosted backup with disaster recovery protection is essential

Businesses are making the protection of critical data and IT infrastructure a top priority nowadays, and everything has to be protected in even the worst case scenario.

The Statistics Tell the Story

Businesses are relying more heavily on information technology than ever before, to the point where it has become crucial to their continuation.

This was the outcome for companies that suffered a major loss of business data:

  • 43% closed their doors for good
  • 51% closed within two years of the loss
  • 6% survived in the long term

Data replication

Some enterprises may feel the need to have a second set of data backed up at a totally different geographical location.

  • The second DS-System can be stored in a different geographical location, yet still receive backed up date from the production source.
  • The replication DS-System then serves as a failsafe for the original.


There are a number of benefits to be had by replicating online storage between 2 or more DS-Systems:

  • Secondary working copies of the data delivers total redundancy.
  • The ability to switch between a failed system and a Replication DS-System offers the highest level of availability.
  • Administrators can access and restore data from a central location.

RecoveryVault LAN discovery

One of the biggest challenges faced when putting together a data protection strategy is figuring out the type of data, and the amount, that exists within an organization.

LAN discovery synopsis

The RecoveryVault LAN Discovery takes into account areas of growth. And then looks at methods of optimization. The LAN Discovery has two clear ways in which it helps:

  • The data that exists on the network is assessed so that duplicate copies can be found. It is then possible to more accurately predict the number of files that will change over a set period of time, which help calculate data growth.
  • Customers view their data in varying degrees of importance, and want options that will help them categorize it for archiving or storage. With descending costs for older data, companies can then make sure that the bulk of their money is spent in storing more critical data.

LAN discovery report

The LAN Discovery included a detailed report that takes a closer look at growth areas, and the optimization of data. The entire network is scanned in order to amass this information, after which all relevant points are split up into a simple, easy to read report that includes:

  • The size of storage needed
  • View the top 10 largest file extensions
  • Lists all files that are duplicates
  • Determine which files to backup
  • Lists how much total, free, and used space is taken up as an example by the SQL Server
  • Shows growth of files over a period of time

LAN discovery benefits

The LAN Discovery reports are a great way to view data information and plan how to backup said data moving forward.

  • This is a real value proposition for companies, as they can take advantage of the LAN Discovery at no extra cost after implementing the RecoveryVault backup software. It is an ideal way to get accurate numbers, which in turn makes it that much easier to purchase the correct amount of backup space and stay within budget.
  • There is no denying the value of the information delivered by the report, but a closer look at mission critical data may be required to ensure that estimates are a little more precise.

Unique Hosted Backup security

Security is a major concern for companies, and they turn to RecoveryVault in order to get total peace of mind. RecoveryVault is fully compliant with FIPS certification, which means that initial and catchup backups can be couriered in South Africa. Companies operating in regulated industries know that they, and not the service provider, are the only ones with access to their data.


RecoveryVault encrypts as it goes, and keeps data safe from beginning to end.

  • This is the only data solution that can collect, store, and transfer backup data for government agencies and regulated industries.
  • Encrypted “at rest” and “on the move” from Source to Disk, while in Transit and in Archive.
  • Destroyed data comes with a certificate of destruction, and is destroyed based on policy.


Included within RecoveryVault is a vital option that allows for the security and safety of encryption keys.

Customers can take advantage of this option by safely sending and storing the encryption key in the Data Centre vault without fear of the key becoming compromised.

The benefit here is that it is then possible to recover data after a disaster without first having to try and track down their encryption key.

The customer is responsible for creating and maintaining their encryption key in RecoveryVault.

Highest Pedigree

Secure backup and recovery is assured with RecoveryVault:

  • More than 2 decades of operation without a single breach or compromised system.
  • No open firewall ports.
  • Cannot be hacked.
  • All data is compressed and encrypted when stored.
  • Every file and block of data protected by a digital signature.
  • Data on disk in self-describing format.
  • Background Autonomic Healing.


If the highest level of security is a must for companies, they should really consider taking a look at password management.

This allows administrators to create passwords automatically, and then randomly change them for specific backup user accounts. This helps prevent unauthorized access to data.


Enterprise customers who need their businesses to be compliant in their backups can benefit from some powerful features in RecoveryVault:

  • Disk-based and automated, this solution runs in the background requiring zero manual intervention. This is not the case with tape backups, which is why they are not compliant with the likes of HIPPA and Gram-Leach-Bliley.
  • FIPS 140 certified.
  • All backup data is aggregated and ready for immediate recovery.


SOX Act clearly dictates how companies can store their financial records, and for how long. SOX is in place to prevent companies from performing illegal financial activities. They do this by dictating that all email and instant messages should be stored for a period of no less than 5 years, and should be easily obtained if required.

RecoveryVault handles the SOX issue by making all critical data totally secure, whilst also making it easily accessible. All data is encrypted and stored in a vault where it cannot be accessed without the proper authorization, or damaged in any way.

RecoveryVault offers flexible options

We know that enterprises don’t treat all data with the same level of importance. Not only is some data more critical than other pieces, it is often accessed more regularly. RecoveryVault delivers 3 options that make it easy to prioritize data:

Backup lifecycle

Long term data retention is handled by our Backup Lifecycle Management (BLM), which delivers:

  • Cost-effective long-term data storage.
  • Data indexing that makes backup data highly searchable.
  • Ease of older backup restoration.
  • Managed backup storage destruction.


DS-System Online Storage can have space freed up by BLM, as it creates space currently occupied by stale backup data. Why pay to protect files that are inactive

Data is copied and moved from online storage to archive by BLM.
The BLM retention process does nothing to change the transfer of data from the source to the DS-System.

Backup Architecture

IT environments are generally an amalgam of platforms and technologies. Companies are left juggling different operating systems and data vendors. Things can be made easier for IT when a single platform is used for backing up. This all means that the overall cost to the company can be greatly reduced.

  • Customers can gain control of bandwidth utilization and reduction capabilities in order to increase server performance and availability.
  • Stored data is reduced and/or eliminated to prevent duplication, which in turn reduces the time it takes to perform backups.

Local storage

The need for fast, seamless business continuity is addressed in this module.

  • The latest generation, or multiple generations, of a backup set is stored as a copy on the local LAN.
  • This means that all relevant backup sets can be restored at LAN speed immediately, regardless of whether it’s a total system restore or just an individual file version.


It’s up to you to decide if you want to synchronize the local storage contents with the DS-client database and with the DS-System Online Storage or not.

This process ensures that files from local storage will also be in the records of both the DS-client database and with the DS-System Online Storage

High level benefits of RecoveryVault

Customers often need a variety of different options when it comes to backups. This is especially true if they have a large server infrastructure and a huge network of PC’s and laptops. The goal should be to define how data should be stored in a fast, cost-efficient manner.

Store less

Use RecoveryVault to set up data retention policies through every phase of the backup process. Storage resources can be reclaimed and reused by taking advantage of delete technology.


With RecoveryVault, you get an agentless architecture that ensures no downtime or disruption will be experienced during implementation and upgrades. Security is top notch, thanks in large part to an open agent port that is backed up by a pair of different, totally independent, data centers.

Pay less

Monthly budgeting is a snap, thanks to RecoveryVault being billed on compressed de-duped capacity. The number of locations, protected systems, or remote users has no impact on the total charges.

Less Mundane

Data transfer to a remote location is at the heart of the RecoveryVault architecture. Companies can choose between a Public Cloud infrastructure or their own Private Cloud when optimizing the backup and recovery of central offices, data centers, remote locations, and more.

Ingest less

Global deduplication at the source. Incredible backup and storage efficiencies delivered via WAN Bandwidth Optimization and Storage Capacity Organization.

Capture less

Stale and redundant data is quickly identified using LAN Storage Discovery. Technologies such as common file elimination, incremental forever, single-instance storage, and compression are employed to save you money on a daily basis.

Manage less

File corruption and backed-up data integrity are addressed using Automatic Healing technology.

  • Continuous Data Protection (CDP) Advantage

    The RecoveryVault implementation of CDP is the first to focus on remote office CDP and is designed to work over a WAN. The CDP functionality is simply integrated as a feature of the solution, with no additional cost, and no separate CDP application…

  • De-duplication Advantage

    Most systems have common files. These files might exist in more than one location, or be common to many customers, such as operating system files. It wastes bandwidth and storage space to transmit and store these files multiple times…

  • Heterogeneous Agentless Support Advantage

    The RecoveryVault solution consists of the DS-Client software, which is installed once at protected sites, and DS-System Vault software, which is located in our secure data centre. The DS-Client software is installed on a fully managed appliance…

  • Backup Lifecycle Management Module

    One of the distinguishing features of RecoveryVault is its management of the backup life cycles. Not only does RecoveryVault understand how to manage the lifecycle of backups, the company coined the term Backup Lifecycle Management (BLM)…

  • Data Centre and Remote Site Protection

    RecoveryVault is the next generation backup and recovery service designed to offer backup and storage efficiencies unavailable with traditional backup architecture by allowing you to capture less, ingest less, and store less data thus reducing overheads.

  • Desktop and Laptop Protection

    Even though you back up your LAN servers regularly, you know that users still store mission critical data on their desktop and laptop hard drives. Often this is information that is crucial for your day-today operations, as well as legal compliance…

  • Disaster Recovery Protection

    With the increasing importance of information technology for the continuation of business critical functions, combined with a transition to an around-the-clock economy, the importance of protecting an organization’s data and IT infrastructure…

  • Mass Deployment Advantage

    The DS-Client Mass Deployment feature enables you to deploy the RecoveryVault DS-Client software in silent mode and configure the software automatically to ensure minimum time consumption for sites remote users with similar configuration…

  • Planning a Backup Strategy

    Backups, restores, and data recovery operations are some of the most important tasks that an IT organization performs. Businesses cannot risk losing access to data for any significant amount of time; therefore, the organization should develop…

  • RecoveryVault Overview

    RecoveryVault is the next generation backup and recovery service designed to offer backup and storage efficiencies unavailable with traditional backup architecture by allowing you to capture less, ingest less, and store less data thus reducing overheads.

  • Virtual Environment Protection

    Server consolidation is driving deployment of virtualization across enterprises of all sizes. However, to fully realize the benefits of virtualization, organizations must consider their information recovery management strategy. Traditional backup…

  • Local Storage Module

    This module addresses the need for rapid, seamless business continuity. It stores a copy of the latest generation or multiple generations of a backup set on the local LAN, and ensures that relevant backup sets are always available for immediate…

  • Replication Module

    RecoveryVault protects data by copying data off-site to a secure location and maintaining several versions of files, to protect against both accidental and malicious data corruption.

  • Security, Encryption & Compliance Advantage

    Recovery Vault encrypts the data in flight and at rest from cradle to grave.

  • LAN Discovery Module

    LAN Storage Discovery focuses on areas of data growth and ways to help you optimize data. It is useful both before and after you begin using RecoveryVault