SlideShare a Scribd company logo
1 of 10
Manufacturing
      Peace of Mind



Ace Data Devices Pvt. Ltd.
A G E N D A:


               •   Introduction

               •   Backup process

               •   Recovery process

               •   Software overview

               •   Security and Privacy

               •   Backup Policy
Introducing Ace Data Devices Cloud
based Backup
 At the most basic level, Cloud
 Backup involves the Backup of your
 data into Ace Data Devices’s Backup
 Vault, over Wide Area Network,
 using standard Internet protocols.


 • Hardware Infrastructure is shared –
 increase of efficiencies and reducing
 costs
 • Unlimited amount of storage that is
 highly available, secured and
 inexpensive
 • Flexible allocation of storage
 capacity without limit
The process of performing Backup
to the Cloud:
 • Installation of Backup Vault Client(s) according to the client network
   , number of servers, mix of application, Operating systems and the
   quantity of data to be managed to one or more work stations.

 • Definition of Backup sets (files and databases that are to be backed
   up, eliminating the Backup of unnecessary data) and Backup
   Schedule (if different from the system’s default schedule).

 • Initial seeding and reduction of the low Internet connections speed
   limitations – The first Full Backup (seed) is performed at your site
   where the data is copied on Portable storage device provided by Ace
   Data Devices, at LAN speed. This copy is then transferred to our
   Data Center. Afterwards the Incremental Backups can run smoothly
   via WAN
The process of performing Backup
to the Cloud – security path:




                                Ace Data secures & encrypts the data in-flight &
                                at-rest, from cradle to grave
                                     •   From server to DS-Client to DS-System to
                                         disk to “On-the-Shelf” archive
                                     •   At rest in the DS-System and in the archive
  ALL Ace Data components           •   AES 256 Encryption
   communication is encrypted        •   Customers have their own Private and
                                         Organizational encryption keys
  No open firewall ports
                                     •   Data destroyed based on policy with
  Can’t be hacked                       certificate
                                           of destruction
The process of Cloud Recovery:

 •   In case of massive Recoveries – Files that
     need to be Restored are copied from our Data
     Centre to a high capacity Portable Storage
     device and then transferred to your site where
     the Recovery process occurs at LAN speed.

 •   For normal Recoveries – user friendly and
     simple GUI will guide your administrator
     through the smooth process of selecting the
     data that need to be Restored. The process
     occurs at WAN speed
Software overview:
Security and privacy of your data
Our priority No. 1
 •   AES 256 bit, compliant with SOX HIPPA, Basel II and FIPS
     140-2 compliancy standards, Encryption and Decryption of
     your data

 •   Your data is encrypted before they leave to the Cloud and
     after the arrival

 •   Encryption keys are unique, generated by the Backup Vault
     Client and stored in the database in encrypted form, so even
     in case of full access to the Backup Vault Client they cannot
     be read. This means that eventual modification or loss of the
     encryption key by your side, will make data stored on the
     Cloud unusable

 •   Full 24/7 support from designated Ace Data Devices support
     team
Backup Policy:

 •   The Backup policy is unique for every client and it is adjustable for
     every user, platform and type of data that needs to be Backed up

 •   There are no limitations regarding the type of data that can be Backed up in
     our Data center - Databases, Applications Operating systems, transaction
     logs, MP3 AVI, JPEG files….

 •   There are no limitations considering the supported platforms that the client
     wishes to cover with the solution - Desktop Backup, Enterprise servers
     Backup, laptops, smart phones…

 •   The frequency of the Backup operations is adjustable in accordance to the
     client’s needs (once a day, once a week, twice a day every six hours, every
     hour…)

 •   There are no limitations regarding the time and number of Backup copies
     the client wishes to retain on the Cloud. This is part is also customizable
     and in accordance to the client‘s needs for retaining a suitable number of
     copies (the last copy, the last 2 or 3 copies..)
Backup Policy:

    Example for desktop Backup – Best
                practice
• First full Backup on site on Portable storage device
via LAN which is transferred to Ace Data Devices Data
Center
• Next initial Backup – automatically, after 24 hours
(by default) via WAN
• Backup operation can be scheduled during normal
working time – 09:00 – 17:30 hours (by default)
• At a given moment of time you have:
    Daily copy for 7 consecutive working days - 7
    Weekly copy for 4 consecutive weeks – 4
    Monthly copy for the past month – 1
    7+4+1=12 – the total number of copies available
   for Recovery. The client chooses which one of
   these copy wants to restore (day, week or month
   copy) without any time or availability limitations

More Related Content

What's hot

Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...xKinAnx
 
Introducing IBM Spectrum Scale 4.2 and Elastic Storage Server 3.5
Introducing IBM Spectrum Scale 4.2 and Elastic Storage Server 3.5Introducing IBM Spectrum Scale 4.2 and Elastic Storage Server 3.5
Introducing IBM Spectrum Scale 4.2 and Elastic Storage Server 3.5Doug O'Flaherty
 
IBM Platform Computing Elastic Storage
IBM Platform Computing  Elastic StorageIBM Platform Computing  Elastic Storage
IBM Platform Computing Elastic StoragePatrick Bouillaud
 
Engage for success ibm spectrum accelerate 2
Engage for success   ibm spectrum accelerate 2Engage for success   ibm spectrum accelerate 2
Engage for success ibm spectrum accelerate 2xKinAnx
 
IBM Spectrum Scale Security
IBM Spectrum Scale Security IBM Spectrum Scale Security
IBM Spectrum Scale Security Sandeep Patil
 
Azure SQL DB V12 at your service by Pieter Vanhove
Azure SQL DB V12 at your service by Pieter VanhoveAzure SQL DB V12 at your service by Pieter Vanhove
Azure SQL DB V12 at your service by Pieter VanhoveITProceed
 
Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”
Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”
Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”Emirates Computers
 
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...xKinAnx
 
Trusted DB a trusted hardware based database with privacy and data confidenti...
Trusted DB a trusted hardware based database with privacy and data confidenti...Trusted DB a trusted hardware based database with privacy and data confidenti...
Trusted DB a trusted hardware based database with privacy and data confidenti...Papitha Velumani
 
Storage, San And Business Continuity Overview
Storage, San And Business Continuity OverviewStorage, San And Business Continuity Overview
Storage, San And Business Continuity OverviewAlan McSweeney
 
JPD1418 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
JPD1418  TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...JPD1418  TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
JPD1418 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...chennaijp
 
Best practices for using flash in hyperscale software storage architectures
Best practices for using flash in hyperscale software storage architecturesBest practices for using flash in hyperscale software storage architectures
Best practices for using flash in hyperscale software storage architecturesEric Carter
 
Spectrum scale object analytics
Spectrum scale object analyticsSpectrum scale object analytics
Spectrum scale object analyticsSmita Raut
 
IMCSummit 2015 - Day 2 General Session - Flash-Extending In-Memory Computing
IMCSummit 2015 - Day 2 General Session - Flash-Extending In-Memory ComputingIMCSummit 2015 - Day 2 General Session - Flash-Extending In-Memory Computing
IMCSummit 2015 - Day 2 General Session - Flash-Extending In-Memory ComputingIn-Memory Computing Summit
 
SQL Server 2016 New Security Features
SQL Server 2016 New Security FeaturesSQL Server 2016 New Security Features
SQL Server 2016 New Security FeaturesGianluca Sartori
 
Analytics with unified file and object
Analytics with unified file and object Analytics with unified file and object
Analytics with unified file and object Sandeep Patil
 
IBM Spectrum scale object deep dive training
IBM Spectrum scale object  deep dive trainingIBM Spectrum scale object  deep dive training
IBM Spectrum scale object deep dive trainingSmita Raut
 
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...xKinAnx
 

What's hot (20)

Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
 
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
 
Introducing IBM Spectrum Scale 4.2 and Elastic Storage Server 3.5
Introducing IBM Spectrum Scale 4.2 and Elastic Storage Server 3.5Introducing IBM Spectrum Scale 4.2 and Elastic Storage Server 3.5
Introducing IBM Spectrum Scale 4.2 and Elastic Storage Server 3.5
 
IBM Platform Computing Elastic Storage
IBM Platform Computing  Elastic StorageIBM Platform Computing  Elastic Storage
IBM Platform Computing Elastic Storage
 
Engage for success ibm spectrum accelerate 2
Engage for success   ibm spectrum accelerate 2Engage for success   ibm spectrum accelerate 2
Engage for success ibm spectrum accelerate 2
 
Datacenter overview
Datacenter overviewDatacenter overview
Datacenter overview
 
IBM Spectrum Scale Security
IBM Spectrum Scale Security IBM Spectrum Scale Security
IBM Spectrum Scale Security
 
Azure SQL DB V12 at your service by Pieter Vanhove
Azure SQL DB V12 at your service by Pieter VanhoveAzure SQL DB V12 at your service by Pieter Vanhove
Azure SQL DB V12 at your service by Pieter Vanhove
 
Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”
Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”
Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”
 
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
 
Trusted DB a trusted hardware based database with privacy and data confidenti...
Trusted DB a trusted hardware based database with privacy and data confidenti...Trusted DB a trusted hardware based database with privacy and data confidenti...
Trusted DB a trusted hardware based database with privacy and data confidenti...
 
Storage, San And Business Continuity Overview
Storage, San And Business Continuity OverviewStorage, San And Business Continuity Overview
Storage, San And Business Continuity Overview
 
JPD1418 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
JPD1418  TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...JPD1418  TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
JPD1418 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
 
Best practices for using flash in hyperscale software storage architectures
Best practices for using flash in hyperscale software storage architecturesBest practices for using flash in hyperscale software storage architectures
Best practices for using flash in hyperscale software storage architectures
 
Spectrum scale object analytics
Spectrum scale object analyticsSpectrum scale object analytics
Spectrum scale object analytics
 
IMCSummit 2015 - Day 2 General Session - Flash-Extending In-Memory Computing
IMCSummit 2015 - Day 2 General Session - Flash-Extending In-Memory ComputingIMCSummit 2015 - Day 2 General Session - Flash-Extending In-Memory Computing
IMCSummit 2015 - Day 2 General Session - Flash-Extending In-Memory Computing
 
SQL Server 2016 New Security Features
SQL Server 2016 New Security FeaturesSQL Server 2016 New Security Features
SQL Server 2016 New Security Features
 
Analytics with unified file and object
Analytics with unified file and object Analytics with unified file and object
Analytics with unified file and object
 
IBM Spectrum scale object deep dive training
IBM Spectrum scale object  deep dive trainingIBM Spectrum scale object  deep dive training
IBM Spectrum scale object deep dive training
 
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
 

Similar to First Cloud based enterprise Backup & Recovery in India

EarthLink Business Cloud Server Backup
EarthLink Business Cloud Server BackupEarthLink Business Cloud Server Backup
EarthLink Business Cloud Server BackupMike Ricca
 
How To Build A Stable And Robust Base For a “Cloud”
How To Build A Stable And Robust Base For a “Cloud”How To Build A Stable And Robust Base For a “Cloud”
How To Build A Stable And Robust Base For a “Cloud”Hardway Hou
 
Proact ExaGrid Seminar Presentation KK 20220419.pdf
Proact ExaGrid Seminar Presentation KK 20220419.pdfProact ExaGrid Seminar Presentation KK 20220419.pdf
Proact ExaGrid Seminar Presentation KK 20220419.pdfKarel Kannel
 
SoftLayer Storage Services Overview
SoftLayer Storage Services OverviewSoftLayer Storage Services Overview
SoftLayer Storage Services OverviewMichael Fork
 
Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021Karel Kannel
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!MarketingArrowECS_CZ
 
Storage for Microsoft®Windows Enfironments
Storage for Microsoft®Windows EnfironmentsStorage for Microsoft®Windows Enfironments
Storage for Microsoft®Windows EnfironmentsMichael Hudak
 
Webinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it BetterWebinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it BetterStorage Switzerland
 
Webinar: Making The Always-On Data Center A Reality
Webinar: Making The Always-On Data Center A RealityWebinar: Making The Always-On Data Center A Reality
Webinar: Making The Always-On Data Center A RealityStorage Switzerland
 
RapidScale CloudServer
RapidScale CloudServerRapidScale CloudServer
RapidScale CloudServerRapidScale
 
Cloud Computing Storage With CubeXS Weatherly...
Cloud Computing Storage With CubeXS Weatherly...Cloud Computing Storage With CubeXS Weatherly...
Cloud Computing Storage With CubeXS Weatherly...Weatherly Cloud Inc.
 
SoftLayer Storage Services Overview (for Interop Las Vegas 2015)
SoftLayer Storage Services Overview (for Interop Las Vegas 2015)SoftLayer Storage Services Overview (for Interop Las Vegas 2015)
SoftLayer Storage Services Overview (for Interop Las Vegas 2015)Michael Fork
 
cloud_and_virtualization_concepts.pdf
cloud_and_virtualization_concepts.pdfcloud_and_virtualization_concepts.pdf
cloud_and_virtualization_concepts.pdfRAJURAJ111120
 
SAP Cloud security overview 2.0
SAP Cloud security overview 2.0SAP Cloud security overview 2.0
SAP Cloud security overview 2.0Rasmi Swain
 
Azure IaaS Tanıtım - Uzun Anlatım
Azure IaaS Tanıtım - Uzun AnlatımAzure IaaS Tanıtım - Uzun Anlatım
Azure IaaS Tanıtım - Uzun AnlatımMustafa
 
Hosted Revolution Online Backup V2 001
Hosted Revolution Online Backup V2 001Hosted Revolution Online Backup V2 001
Hosted Revolution Online Backup V2 001Steve Crawford
 
Ragic - Data Security Overview
Ragic - Data Security OverviewRagic - Data Security Overview
Ragic - Data Security OverviewRagic
 

Similar to First Cloud based enterprise Backup & Recovery in India (20)

EarthLink Business Cloud Server Backup
EarthLink Business Cloud Server BackupEarthLink Business Cloud Server Backup
EarthLink Business Cloud Server Backup
 
How To Build A Stable And Robust Base For a “Cloud”
How To Build A Stable And Robust Base For a “Cloud”How To Build A Stable And Robust Base For a “Cloud”
How To Build A Stable And Robust Base For a “Cloud”
 
Proact ExaGrid Seminar Presentation KK 20220419.pdf
Proact ExaGrid Seminar Presentation KK 20220419.pdfProact ExaGrid Seminar Presentation KK 20220419.pdf
Proact ExaGrid Seminar Presentation KK 20220419.pdf
 
Irm solutions 09 2014
Irm solutions 09 2014Irm solutions 09 2014
Irm solutions 09 2014
 
SoftLayer Storage Services Overview
SoftLayer Storage Services OverviewSoftLayer Storage Services Overview
SoftLayer Storage Services Overview
 
Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
 
cloudcomputing.pptx
cloudcomputing.pptxcloudcomputing.pptx
cloudcomputing.pptx
 
Storage for Microsoft®Windows Enfironments
Storage for Microsoft®Windows EnfironmentsStorage for Microsoft®Windows Enfironments
Storage for Microsoft®Windows Enfironments
 
Webinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it BetterWebinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it Better
 
Webinar: Making The Always-On Data Center A Reality
Webinar: Making The Always-On Data Center A RealityWebinar: Making The Always-On Data Center A Reality
Webinar: Making The Always-On Data Center A Reality
 
RapidScale CloudServer
RapidScale CloudServerRapidScale CloudServer
RapidScale CloudServer
 
Cloud Computing Storage With CubeXS Weatherly...
Cloud Computing Storage With CubeXS Weatherly...Cloud Computing Storage With CubeXS Weatherly...
Cloud Computing Storage With CubeXS Weatherly...
 
SoftLayer Storage Services Overview (for Interop Las Vegas 2015)
SoftLayer Storage Services Overview (for Interop Las Vegas 2015)SoftLayer Storage Services Overview (for Interop Las Vegas 2015)
SoftLayer Storage Services Overview (for Interop Las Vegas 2015)
 
cloud_and_virtualization_concepts.pdf
cloud_and_virtualization_concepts.pdfcloud_and_virtualization_concepts.pdf
cloud_and_virtualization_concepts.pdf
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
SAP Cloud security overview 2.0
SAP Cloud security overview 2.0SAP Cloud security overview 2.0
SAP Cloud security overview 2.0
 
Azure IaaS Tanıtım - Uzun Anlatım
Azure IaaS Tanıtım - Uzun AnlatımAzure IaaS Tanıtım - Uzun Anlatım
Azure IaaS Tanıtım - Uzun Anlatım
 
Hosted Revolution Online Backup V2 001
Hosted Revolution Online Backup V2 001Hosted Revolution Online Backup V2 001
Hosted Revolution Online Backup V2 001
 
Ragic - Data Security Overview
Ragic - Data Security OverviewRagic - Data Security Overview
Ragic - Data Security Overview
 

Recently uploaded

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

First Cloud based enterprise Backup & Recovery in India

  • 1. Manufacturing Peace of Mind Ace Data Devices Pvt. Ltd.
  • 2. A G E N D A: • Introduction • Backup process • Recovery process • Software overview • Security and Privacy • Backup Policy
  • 3. Introducing Ace Data Devices Cloud based Backup At the most basic level, Cloud Backup involves the Backup of your data into Ace Data Devices’s Backup Vault, over Wide Area Network, using standard Internet protocols. • Hardware Infrastructure is shared – increase of efficiencies and reducing costs • Unlimited amount of storage that is highly available, secured and inexpensive • Flexible allocation of storage capacity without limit
  • 4. The process of performing Backup to the Cloud: • Installation of Backup Vault Client(s) according to the client network , number of servers, mix of application, Operating systems and the quantity of data to be managed to one or more work stations. • Definition of Backup sets (files and databases that are to be backed up, eliminating the Backup of unnecessary data) and Backup Schedule (if different from the system’s default schedule). • Initial seeding and reduction of the low Internet connections speed limitations – The first Full Backup (seed) is performed at your site where the data is copied on Portable storage device provided by Ace Data Devices, at LAN speed. This copy is then transferred to our Data Center. Afterwards the Incremental Backups can run smoothly via WAN
  • 5. The process of performing Backup to the Cloud – security path: Ace Data secures & encrypts the data in-flight & at-rest, from cradle to grave • From server to DS-Client to DS-System to disk to “On-the-Shelf” archive • At rest in the DS-System and in the archive  ALL Ace Data components • AES 256 Encryption communication is encrypted • Customers have their own Private and Organizational encryption keys  No open firewall ports • Data destroyed based on policy with  Can’t be hacked certificate of destruction
  • 6. The process of Cloud Recovery: • In case of massive Recoveries – Files that need to be Restored are copied from our Data Centre to a high capacity Portable Storage device and then transferred to your site where the Recovery process occurs at LAN speed. • For normal Recoveries – user friendly and simple GUI will guide your administrator through the smooth process of selecting the data that need to be Restored. The process occurs at WAN speed
  • 8. Security and privacy of your data Our priority No. 1 • AES 256 bit, compliant with SOX HIPPA, Basel II and FIPS 140-2 compliancy standards, Encryption and Decryption of your data • Your data is encrypted before they leave to the Cloud and after the arrival • Encryption keys are unique, generated by the Backup Vault Client and stored in the database in encrypted form, so even in case of full access to the Backup Vault Client they cannot be read. This means that eventual modification or loss of the encryption key by your side, will make data stored on the Cloud unusable • Full 24/7 support from designated Ace Data Devices support team
  • 9. Backup Policy: • The Backup policy is unique for every client and it is adjustable for every user, platform and type of data that needs to be Backed up • There are no limitations regarding the type of data that can be Backed up in our Data center - Databases, Applications Operating systems, transaction logs, MP3 AVI, JPEG files…. • There are no limitations considering the supported platforms that the client wishes to cover with the solution - Desktop Backup, Enterprise servers Backup, laptops, smart phones… • The frequency of the Backup operations is adjustable in accordance to the client’s needs (once a day, once a week, twice a day every six hours, every hour…) • There are no limitations regarding the time and number of Backup copies the client wishes to retain on the Cloud. This is part is also customizable and in accordance to the client‘s needs for retaining a suitable number of copies (the last copy, the last 2 or 3 copies..)
  • 10. Backup Policy: Example for desktop Backup – Best practice • First full Backup on site on Portable storage device via LAN which is transferred to Ace Data Devices Data Center • Next initial Backup – automatically, after 24 hours (by default) via WAN • Backup operation can be scheduled during normal working time – 09:00 – 17:30 hours (by default) • At a given moment of time you have:  Daily copy for 7 consecutive working days - 7  Weekly copy for 4 consecutive weeks – 4  Monthly copy for the past month – 1  7+4+1=12 – the total number of copies available for Recovery. The client chooses which one of these copy wants to restore (day, week or month copy) without any time or availability limitations