The consulting company, Dewell & Associates had a disk drive crash
six months after it began operations. And, even with a fully backed
up system on a tape drive, it took well over five days to get a critical
computer system restored. Newell & Associates spent several months investigating
all the alternatives to manual backup systems. And, finally decided
that the best backup system is the one used by Fortune 500 companies.
Companies like IBM, GE, and Amoco.
Most fortune 500 companies use the same basic techniques to protect
their data:
- All their systems are completely automated
- The data is copied to a central location
- Highly skilled technicians implement and monitor the process
- Maintain multiple layers (copies) of their data
Dewell & Associates then spent several months searching for the right
hardware and software to enable this backup system to work for a typical
company. Without the high overhead.
In the middle of 2004, The Data Store, Inc., a leading backup software company,
released a remote online backup system that would allow Dewell & Associates
to set up a centralized backup server so that its customers could lease
a highly effective backup system with no overhead.
The advantages to a typical business are enormous:
- All files are protected by state of the art encryption, only the
customer can retrieve their files
- Completely automated off-site protection
- Fast online recovery of any version of any protected file
- Easy installation and setup
- Only an internet connection is required, eliminating the need
for expensive backup equipment and media
- The backup server is monitored by highly skilled technicians whose
only job is to make sure the backups are performed properly
This is how it works....
We operate an off-site storage facility for the user's data. At
the facility, an encrypted account is maintained for each user. Each account is
protected by a password known only to the user!
The electronic vault system is set up so that at a preset time, usually
late at night the client's computer automatically wakes up and prepares
its data for backup, it determines which files have been modified since
the last backup, compresses them, encrypts them for security. When the
data is ready the computer uses its Internet connection to contact our Servers and
transmit the data.
Our Servers verify and store the data, but the redundancy doesn't
stop there. Our servers are configured with automatic
redundancy to provide an additional layer of protection for your
data. And because we're no different when it comes to a disaster,
(it could happen to us too !), we've taken measures to mirror our
own backup servers to another off-site location.
|