Learn the benefits of the new generation of Cloud based backup that harnesses the power of the Cloud and gives you the Peace of Mind you were longing for
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
First Cloud based enterprise Backup & Recovery in India
1. Manufacturing
Peace of Mind
Ace Data Devices Pvt. Ltd.
2. A G E N D A:
• Introduction
• Backup process
• Recovery process
• Software overview
• Security and Privacy
• Backup Policy
3. Introducing Ace Data Devices Cloud
based Backup
At the most basic level, Cloud
Backup involves the Backup of your
data into Ace Data Devices’s Backup
Vault, over Wide Area Network,
using standard Internet protocols.
• Hardware Infrastructure is shared –
increase of efficiencies and reducing
costs
• Unlimited amount of storage that is
highly available, secured and
inexpensive
• Flexible allocation of storage
capacity without limit
4. The process of performing Backup
to the Cloud:
• Installation of Backup Vault Client(s) according to the client network
, number of servers, mix of application, Operating systems and the
quantity of data to be managed to one or more work stations.
• Definition of Backup sets (files and databases that are to be backed
up, eliminating the Backup of unnecessary data) and Backup
Schedule (if different from the system’s default schedule).
• Initial seeding and reduction of the low Internet connections speed
limitations – The first Full Backup (seed) is performed at your site
where the data is copied on Portable storage device provided by Ace
Data Devices, at LAN speed. This copy is then transferred to our
Data Center. Afterwards the Incremental Backups can run smoothly
via WAN
5. The process of performing Backup
to the Cloud – security path:
Ace Data secures & encrypts the data in-flight &
at-rest, from cradle to grave
• From server to DS-Client to DS-System to
disk to “On-the-Shelf” archive
• At rest in the DS-System and in the archive
ALL Ace Data components • AES 256 Encryption
communication is encrypted • Customers have their own Private and
Organizational encryption keys
No open firewall ports
• Data destroyed based on policy with
Can’t be hacked certificate
of destruction
6. The process of Cloud Recovery:
• In case of massive Recoveries – Files that
need to be Restored are copied from our Data
Centre to a high capacity Portable Storage
device and then transferred to your site where
the Recovery process occurs at LAN speed.
• For normal Recoveries – user friendly and
simple GUI will guide your administrator
through the smooth process of selecting the
data that need to be Restored. The process
occurs at WAN speed
8. Security and privacy of your data
Our priority No. 1
• AES 256 bit, compliant with SOX HIPPA, Basel II and FIPS
140-2 compliancy standards, Encryption and Decryption of
your data
• Your data is encrypted before they leave to the Cloud and
after the arrival
• Encryption keys are unique, generated by the Backup Vault
Client and stored in the database in encrypted form, so even
in case of full access to the Backup Vault Client they cannot
be read. This means that eventual modification or loss of the
encryption key by your side, will make data stored on the
Cloud unusable
• Full 24/7 support from designated Ace Data Devices support
team
9. Backup Policy:
• The Backup policy is unique for every client and it is adjustable for
every user, platform and type of data that needs to be Backed up
• There are no limitations regarding the type of data that can be Backed up in
our Data center - Databases, Applications Operating systems, transaction
logs, MP3 AVI, JPEG files….
• There are no limitations considering the supported platforms that the client
wishes to cover with the solution - Desktop Backup, Enterprise servers
Backup, laptops, smart phones…
• The frequency of the Backup operations is adjustable in accordance to the
client’s needs (once a day, once a week, twice a day every six hours, every
hour…)
• There are no limitations regarding the time and number of Backup copies
the client wishes to retain on the Cloud. This is part is also customizable
and in accordance to the client‘s needs for retaining a suitable number of
copies (the last copy, the last 2 or 3 copies..)
10. Backup Policy:
Example for desktop Backup – Best
practice
• First full Backup on site on Portable storage device
via LAN which is transferred to Ace Data Devices Data
Center
• Next initial Backup – automatically, after 24 hours
(by default) via WAN
• Backup operation can be scheduled during normal
working time – 09:00 – 17:30 hours (by default)
• At a given moment of time you have:
Daily copy for 7 consecutive working days - 7
Weekly copy for 4 consecutive weeks – 4
Monthly copy for the past month – 1
7+4+1=12 – the total number of copies available
for Recovery. The client chooses which one of
these copy wants to restore (day, week or month
copy) without any time or availability limitations