Examples of disaster include a fire or flood destroying Company systems and data, but it also equates with something a lot simpler but no less tragic such as a disk drive crash and being caught unprepared without a backup plan or having an untested plan that will only fail when needed. The inability to retrieve valuable data has caused many successful organizations to go out of business. Corrupted tapes and user errors are the highest factors in failure to restore. For more information please see our
Frequently Asked Questions.
Mass Data Store understands the critical nature of corruption or loss of valuable data records and has built a Remote Backup Redundancy program that ensures a full recovery of business operations. The number one key to this equation is that the backups are kept in a remote server. Any data that is backed up and kept in the same building is in danger of also being destroyed, even in a firebox.
Mass Data Store runs the file backups at scheduled intervals that best accommodate the client’s daily operations, via an internet connection using an encrypted format where the data is securely stored on a server in a remote location. The encryption protects the data from third parties, it is secure while it passes over the internet and when stored. Each account is protected by a password known only to the user.
Most fortune 500 companies use the same basic techniques to protect
their data:
- All their systems are completely automated
- The data is copied to a central location
- Highly skilled technicians implement and monitor the process
Newell & Associates then spend several months searching for the right
hardware and software to enable this backup system to work for a typical
company. Without the high overhead.
In the middle of 1999, Quantum Tech, a leading backup software company,
released a remote online backup system that would allow Newell & Associates
to set up a centralized backup server so that its customers could lease
a highly effective backup system with no overhead.
The advantages to a typical business are enormous:
- All files are protected by state of the art encryption, only the
customer can retrieve their files
- Completely automated off-site protection
- Fast online recovery of any version of any protected file
- Easy installation and setup
- Only an internet connection is required, eliminating the need
for expensive backup equipment and media
- The backup server is monitored by highly skilled technicians whose
only job is to make sure the backups are performed properly
This is how it works....
We operate an off-site storage facility for the user's data. At
the facility, an account is maintained for each user. Each account is
protected by a password known only to the user!
The electronic vault system is set up so that at a preset time, usually
late at night the clients computer automatically wakes up and prepares
its data for backup, it determines which files have been modified since
the last backup, compresses them, encrypts them for security. When the
data is ready the computer uses its modem or Internet connection to contact our Servers and
transmit the data. Our Servers verify and store the data. The next morning the
backup is transferred to a tape by experts and placed in a fireproof safe
and brought to an other remote location . They can rest assured that their data is safe, because
it is stored off-site in two different locations and still in it's
encrypted state.
|