The consulting company, Newell & Associates had a disk drive crash six months after it began operations. And, even with a fully backed up system on a tape drive, it took over five days to get a critical computer system restored. Newell & Associates spend several months investigating all the alternatives to manual backup systems. And, finally decided that the best backup system is the one used by Fortune 500 companies. Companies like IBM, GE, and Amoco.
Most fortune 500 companies use the same basic techniques to protect their data:
- All their systems are completely automated
- The data is copied to a central location
- Highly skilled technicians implement and monitor the process
Newell & Associates then spend several months searching for the right hardware and software to enable this backup system to work for a typical company. Without the high overhead.
In the middle of 1999, Quantum Tech, a leading backup software company, released a remote online backup system that would allow Newell & Associates to set up a centralized backup server so that its customers could lease a highly effective backup system with no overhead.
The advantages to a typical business are enormous:
- All files are protected by state of the art encryption, only the customer can retrieve their files
- Completely automated off-site protection
- Fast online recovery of any version of any protected file
- Easy installation and setup
- Only an internet connection is required, eliminating the need for expensive backup equipment and media
- The backup server is monitored by highly skilled technicians whose only job is to make sure the backups are performed properly
This is how it works....
We operate an off-site storage facility for the user's data. At the facility, an account is maintained for each user. Each account is protected by a password known only to the user!
The electronic vault system is set up so that at a preset time, usually late at night the clients computer automatically wakes up and prepares its data for backup, it determines which files have been modified since the last backup, compresses them, encrypts them for security. When the data is ready the computer uses its modem or Internet connection to contact our Servers and transmit the data.
Our Servers verify and store the data. The next morning the backup is transferred to a tape and placed in a fireproof safe for permanent safe keeping. They can rest assured that their data is safe, because it is stored off-site.
|