What are you looking for ?
Infinidat
Articles_top

Perimeter eSecurity Launches Remote Backup and Recovery Service

To protect data assets and ensure compliance with regulatory requirements

Perimeter eSecurity, a provider of Complete Security On Demand, announced their Remote Backup & Recovery (RBR) Offering which provides a reliable, on-demand storage engine to securely back up and recover business data. RBR is a fully digital service that allows organizations to maintain a regular backup schedule. This automated, cost-effective remote data backup solution provides customers with an assurance that their data will always be available, stored securely, and meet compliance requirements in the light of a major disaster or even a more common simple system failure.   Once the solution is setup, it requires no client time or effort and is not prone to human error or typical IT problems that in-house solutions are known to create.  Backups can be scheduled, in full, part, or incrementally, to reoccur at any time, 24/7, while simultaneously allowing customers access to other systems.

"People and data are an organization’s two most critical assets.  However, without the data both the people and the organization come to s standstill," said Doug Howard, Chief Strategy Officer, Perimeter eSecurity. "Many organizations do not adequately protect against data loss and system failure risks caused by technical, human, and natural disasters. Conventional backup methods such as physical tapes and drives are inefficient, prone to error, and incur extensive administrative costs. A disk crash or inadequate backup procedure can cause material business disruption and financial loss.  If the prospect of a "big disaster" doesn’t concern an enterprise, just imagine the man-hours lost on PC failures around an organization.  Up until now an affordably priced, comprehensive and fully compliant back-up option that supports an organization’s Business Continuity, Security and Governance requirements has not been made available on demand."  

With Perimeter’s RBR product offering, all files are encrypted locally before they leave the customer’s systems to ensure the privacy of their data. Each encrypted file is replicated and delivered to Perimeter’s two off-site Level 3 data storage centers. Perimeter controls the integrity of the servers and their environments to keep data accessible 24/7. All restored files remain encrypted and cannot be viewed until decrypted by the client using access key credentials.

"Reliable data backup protection is an essential business practice for organizations of all sizes in many industries, especially those covered under Federal regulations such as, HIPAA or FFIEC," Howard added. "This offering draws on our expertise in offering reliable and secure IT services to financial services and healthcare organizations to meet their compliance needs.  It also demonstrates our commitment and ongoing focus to bring affordable, state-of-the-art services to companies of all sizes in a SaaS model
."

Designed to be used by those with little computer experience or by IT Managers, Perimeter’s RBR software agent can customize many granular preferences such as custom data retention policies. Clients can instantly retrieve historical file versions or restore the entire system to a specified point in time.


Key Features and Benefits of RBR include:

  • Data Storage is off site, online, and highly Secure: Instantly recovers files and restore systems to a specified point in time
  • Multiple Encryption Methods: Ability to select the balance between security and backup speed that best suits your organization
  • Broad Digital File Support: All flat files including open files, system state data, and SQL, Microsoft Active Directory, and Microsoft Exchange databases can be backed up
  • Automated email Confirmations: Clients receive a progress report after each scheduled backup window
  • Extreme File Compression: Maximizes storage space by compressing files up to 90% of original size
  • Sophisticated File Finder Search Capability: Searches for files by name, type, or backup date.
  • Continuous System Evaluation: New files and file types are automatically added to the backup set
Articles_bottom
AIC
ATTO
OPEN-E