Agent-less remote backup & recovery protection for PCs & laptops
One offsite location where backup copies of data are held is often not enough for customers, but two sites means total peace of mind. They can then go ahead and delete their data from their on-site infrastructure, safe in the knowledge that no backup data will be lost.
Total Protection for Workstations
Users generally only store important data on their laptops and PC’s, which means it is not ever backed up.
- It simply isn’t possible to manually backup every computer and laptop remotely every single day.
- Using traditional tape methods to backup data is costly and time consuming. It also requires a high level of training.
- There are remote backup solutions out there, but they are hard to manage, bandwidth intensive, and a huge drain on the budget.
Users Cannot Be Totally Relied Upon
Research has shown time and again that users cannot be relied upon to backup data on a regular basis.
- Relying on users means exposing your company to potentially crippling data losses or long recovery times.
- It also doesn’t help that remote backup solutions for laptops need round the clock maintenance and support. Restoring lost files and administering backup jobs are just a couple of tasks that need constant attention.
RecoveryVault is the solution!
With RecoveryVault you get remote backup solutions that are not available with other methods, and these include:
- The ability to scale up or down as required.
- Manage all of the laptops and PC’s in your company remotely without ever having to use an agent.
- Backup as many as 80 different platforms without having to shell out extra for plug-ins and installation.
- Backup locally, or to remote repositories.
RecoveryVault backs up over 80 different platforms with platform being, Virtual servers!
Many customers opt for this edition when they are concerned with the possibility of a 16% performance overhead of agent based backup, all of which leads to a smaller number of VM’s per server.
Virtual server challenges
An enterprise is forced to make difficult choices when they decide to settle for an agent-based backup and recovery service.
- Virtual server environments become polluted when agent based technologies are used.
- Agents generally don’t deliver much in the way of cohesion.
- It takes altogether too much time and resources to physically install and manage agents on every single application you use.
- Server overhead can increase by as much as 16% with a single agent.
- All of this, and we haven’t yet even discussed the cost of each agent and the security risk involved. It’s clear to see that agent based backup and recovery has an overall negative effect on the virtual server environment.
Virtual server data protection
The hassles that come with protection and recovery are removed by RecoveryVault because of the following:
- Discovering each new guest virtual server.
- Centralizing backup configuration and management.
- Controlling software licensing costs.
- Minimizing initial backup job configuration and on-going management.
- Providing multiple backup options.
- Providing backup options specific to VMWare, Xen & HyperV.
- Broad application and operating system support.
Virtual server auto-discovery
Discovery and configuration are new corporate challenges addressed by RecoveryVault.
- While the guest virtual server is being created, VirtualRecovery will automatically recognize it on the individual host servers.
- With this information on hand, RecoveryVault is then able to gather information about the guest virtual server, whilst also tracking all movements from one host server to another.
- No matter which host server they reside on, guest virtual servers will receive continuous data protection.
Hosted backup with disaster recovery protection is essential
Businesses are making the protection of critical data and IT infrastructure a top priority nowadays, and everything has to be protected in even the worst case scenario.
The Statistics Tell the Story
Businesses are relying more heavily on information technology than ever before, to the point where it has become crucial to their continuation.
This was the outcome for companies that suffered a major loss of business data:
- 43% closed their doors for good
- 51% closed within two years of the loss
- 6% survived in the long term
Some enterprises may feel the need to have a second set of data backed up at a totally different geographical location.
- The second DS-System can be stored in a different geographical location, yet still receive backed up date from the production source.
- The replication DS-System then serves as a failsafe for the original.
There are a number of benefits to be had by replicating online storage between 2 or more DS-Systems:
- Secondary working copies of the data delivers total redundancy.
- The ability to switch between a failed system and a Replication DS-System offers the highest level of availability.
- Administrators can access and restore data from a central location.
RecoveryVault LAN discovery
One of the biggest challenges faced when putting together a data protection strategy is figuring out the type of data, and the amount, that exists within an organization.
LAN discovery synopsis
The RecoveryVault LAN Discovery takes into account areas of growth. And then looks at methods of optimization. The LAN Discovery has two clear ways in which it helps:
- The data that exists on the network is assessed so that duplicate copies can be found. It is then possible to more accurately predict the number of files that will change over a set period of time, which help calculate data growth.
- Customers view their data in varying degrees of importance, and want options that will help them categorize it for archiving or storage. With descending costs for older data, companies can then make sure that the bulk of their money is spent in storing more critical data.
LAN discovery report
The LAN Discovery included a detailed report that takes a closer look at growth areas, and the optimization of data. The entire network is scanned in order to amass this information, after which all relevant points are split up into a simple, easy to read report that includes:
- The size of storage needed
- View the top 10 largest file extensions
- Lists all files that are duplicates
- Determine which files to backup
- Lists how much total, free, and used space is taken up as an example by the SQL Server
- Shows growth of files over a period of time
LAN discovery benefits
The LAN Discovery reports are a great way to view data information and plan how to backup said data moving forward.
- This is a real value proposition for companies, as they can take advantage of the LAN Discovery at no extra cost after implementing the RecoveryVault backup software. It is an ideal way to get accurate numbers, which in turn makes it that much easier to purchase the correct amount of backup space and stay within budget.
- There is no denying the value of the information delivered by the report, but a closer look at mission critical data may be required to ensure that estimates are a little more precise.
Unique Hosted Backup security
Security is a major concern for companies, and they turn to RecoveryVault in order to get total peace of mind. RecoveryVault is fully compliant with FIPS certification, which means that initial and catchup backups can be couriered in South Africa. Companies operating in regulated industries know that they, and not the service provider, are the only ones with access to their data.
RecoveryVault encrypts as it goes, and keeps data safe from beginning to end.
- This is the only data solution that can collect, store, and transfer backup data for government agencies and regulated industries.
- Encrypted “at rest” and “on the move” from Source to Disk, while in Transit and in Archive.
- Destroyed data comes with a certificate of destruction, and is destroyed based on policy.
ENCRYPTION KEY SAFEGUARDING ON RECOVERYVAULT
Included within RecoveryVault is a vital option that allows for the security and safety of encryption keys.
Customers can take advantage of this option by safely sending and storing the encryption key in the Data Centre vault without fear of the key becoming compromised.
The benefit here is that it is then possible to recover data after a disaster without first having to try and track down their encryption key.
The customer is responsible for creating and maintaining their encryption key in RecoveryVault.
Secure backup and recovery is assured with RecoveryVault:
- More than 2 decades of operation without a single breach or compromised system.
- No open firewall ports.
- Cannot be hacked.
- All data is compressed and encrypted when stored.
- Every file and block of data protected by a digital signature.
- Data on disk in self-describing format.
- Background Autonomic Healing.
PASSWORD MANAGEMENT ON RECOVERYVAULT
If the highest level of security is a must for companies, they should really consider taking a look at password management.
This allows administrators to create passwords automatically, and then randomly change them for specific backup user accounts. This helps prevent unauthorized access to data.
Enterprise customers who need their businesses to be compliant in their backups can benefit from some powerful features in RecoveryVault:
- Disk-based and automated, this solution runs in the background requiring zero manual intervention. This is not the case with tape backups, which is why they are not compliant with the likes of HIPPA and Gram-Leach-Bliley.
- FIPS 140 certified.
- All backup data is aggregated and ready for immediate recovery.
SOX Act clearly dictates how companies can store their financial records, and for how long. SOX is in place to prevent companies from performing illegal financial activities. They do this by dictating that all email and instant messages should be stored for a period of no less than 5 years, and should be easily obtained if required.
RecoveryVault handles the SOX issue by making all critical data totally secure, whilst also making it easily accessible. All data is encrypted and stored in a vault where it cannot be accessed without the proper authorization, or damaged in any way.
RecoveryVault offers flexible options
We know that enterprises don’t treat all data with the same level of importance. Not only is some data more critical than other pieces, it is often accessed more regularly. RecoveryVault delivers 3 options that make it easy to prioritize data:
Long term data retention is handled by our Backup Lifecycle Management (BLM), which delivers:
- Cost-effective long-term data storage.
- Data indexing that makes backup data highly searchable.
- Ease of older backup restoration.
- Managed backup storage destruction.
BLM FREES UP STORAGE
DS-System Online Storage can have space freed up by BLM, as it creates space currently occupied by stale backup data. Why pay to protect files that are inactive
Data is copied and moved from online storage to archive by BLM.
The BLM retention process does nothing to change the transfer of data from the source to the DS-System.
IT environments are generally an amalgam of platforms and technologies. Companies are left juggling different operating systems and data vendors. Things can be made easier for IT when a single platform is used for backing up. This all means that the overall cost to the company can be greatly reduced.
- Customers can gain control of bandwidth utilization and reduction capabilities in order to increase server performance and availability.
- Stored data is reduced and/or eliminated to prevent duplication, which in turn reduces the time it takes to perform backups.
The need for fast, seamless business continuity is addressed in this module.
- The latest generation, or multiple generations, of a backup set is stored as a copy on the local LAN.
- This means that all relevant backup sets can be restored at LAN speed immediately, regardless of whether it’s a total system restore or just an individual file version.
It’s up to you to decide if you want to synchronize the local storage contents with the DS-client database and with the DS-System Online Storage or not.
This process ensures that files from local storage will also be in the records of both the DS-client database and with the DS-System Online Storage
High level benefits of RecoveryVault
Customers often need a variety of different options when it comes to backups. This is especially true if they have a large server infrastructure and a huge network of PC’s and laptops. The goal should be to define how data should be stored in a fast, cost-efficient manner.
Use RecoveryVault to set up data retention policies through every phase of the backup process. Storage resources can be reclaimed and reused by taking advantage of delete technology.
With RecoveryVault, you get an agentless architecture that ensures no downtime or disruption will be experienced during implementation and upgrades. Security is top notch, thanks in large part to an open agent port that is backed up by a pair of different, totally independent, data centers.
Monthly budgeting is a snap, thanks to RecoveryVault being billed on compressed de-duped capacity. The number of locations, protected systems, or remote users has no impact on the total charges.
Data transfer to a remote location is at the heart of the RecoveryVault architecture. Companies can choose between a Public Cloud infrastructure or their own Private Cloud when optimizing the backup and recovery of central offices, data centers, remote locations, and more.
Global deduplication at the source. Incredible backup and storage efficiencies delivered via WAN Bandwidth Optimization and Storage Capacity Organization.
Stale and redundant data is quickly identified using LAN Storage Discovery. Technologies such as common file elimination, incremental forever, single-instance storage, and compression are employed to save you money on a daily basis.
File corruption and backed-up data integrity are addressed using Automatic Healing technology.