This document describes Raxsonic's cloud-based data protection solution. It provides complete backup and recovery for servers, applications, desktops, laptops, and mobile devices. The solution protects data across multiple locations through server backup, endpoint backup, archiving, file sharing, and disaster recovery. It uses a unique three-tier encryption process to securely store data in their private and public cloud infrastructure or on-premise with a cloud-connected appliance. The solution is affordable and scalable to meet the needs of organizations of any size.
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Make the Upgrade: Data protection in the cloud
1. Make The Upgrade: Data
Protection in the Cloud
0027 (0)11 568 2365
www.raxsonic.co.za
info@raxsonic.co.za
Erik Von Schlehenried
This solution is classified under Gartner’s “Cool Vendor” List in 2015
2. About Us
We have been working in the SMME space since 2004, we have
tried and tested our global partners system in our own
environment over the last 2 years before incorporating into a
working solution for you.
Our core services include:
• Backup and recovery for file servers, email servers, application servers, database servers
• Endpoint backup and recovery for desktops, laptops, and mobile devices
• Long-term data archive through high volume cloud storage with robust retention and replication
• Complete Disaster Recovery for business continuity
• File Sharing and Collaboration with web app, desktop sync, and mobile app
2
3. Data is Growing at a Rapid Rate
3
DATA GROWTH IS ON EVERYONE’S MIND.
IS IT ON YOURS?
48%of Enterprises ranked data
growth in their top three
challenges*.
*According to Gartner 2010 survey
80%of IT security practitioners say
laptops and mobile devices
pose a significant security risk
to their network because they
are not secure*.
*According to 2013 Ponemon Institute State
of the Endpoint Report
4. Risks of Unprotected Data: Mobile Devices
4
The protection of data on mobile phones, tablets and
laptops is growing increasingly important due to adoption
and frequent loss or theft.
of employees store work
email passwords on their
personal mobile devices.
35%48%48%35%of employees store work
email passwords on their
personal mobile devices.
67%of people use personal
devices, such as mobile
phones or tablets, to access
corporate data.
5. Risks of Unprotected Data: A Disaster Strike
5
of employees store work
email passwords on their
personal mobile devices.
35%48%48%10%of companies without a
disaster recovery plan
survive.
70%of businesses have
experienced data loss due to a
natural disaster, human error
or equipment failure.
When a data disaster strikes, most businesses without a
disaster recovery plan will not survive.
6. Risks of Unprotected Data: File Sharing
6
of employees store work
email passwords on their
personal mobile devices.
35%48%48%55%of workers use a free file
sharing service but don’t
tell their IT department.
84%of finance departments report
using free file sharing to share
company financials.
50% of companies have blacklisted use of free file-sharing.
Have you?
8. • Multiple locations to protect and backup
• No backup system in place
• Aging servers and multiple operating systems
• A need to protect company data on a growing number of mobile devices
• A limited budget; no CAPEX funds available
• A need for a solution that can grow with your business, yet won’t break
the bank
8
Data Protection Challenges
It’s a complex world and difficult to protect rapidly growing
amounts of data. You may have:
10. Advanced Cloud Backup Features
• Available for file or application servers in a virtual
or physical environment
• Includes SharePoint, SQL, Windows server and
Exchange backups
• Bare metal image backups provide complete
recovery of server environment and minimal
downtime
10
Server Backup
Complete backup and recovery for servers and applications, virtual or physical.
11. Advanced Cloud Endpoint Backup Features
• Protects business critical data on smartphones,
tablets or laptops
• Military grade, three-tier encryption process
protects data being shared
• Remote wipe, heterogenous data restore and
geo-tracking prevent data loss
• Puts you back in control of your company’s data
11
Endpoint Backup
Safeguard your company’s data everywhere it lives.
12. Advanced Cloud Archive Features
12
Archive
Save valuable, local storage space by archiving to the cloud.
• Ideal when data has to be stored for a defined
period of time to comply with industry
regulations
• Make room for new data to be stored locally by
moving aging data to the cloud
13. Advanced Cloud File Sharing Features
• Allow employees to preview, share and edit files
in a secure environment
• Use desktop application to sync with any
computer
• Web or mobile application available anytime,
anywhere
13
File Sharing
Enable your employees to safely preview, edit and share files and folders in the
cloud.
14. Advanced Cloud Disaster Recovery Features
• Available for VMWare, Linux, Unix and Windows
environments
• Quickly recover data from one or multiple sites
• Deployable on your own server or with our
cloud-connected appliance available as HaaS
(Hardware as a Service)
14
Disaster Recovery
Be prepared, recover business critical data and ensure limited downtime.
15. 15
• Private Cloud: Your on-premise, private cloud
• Public Cloud: Host data in our secure, public cloud
• Hybrid Cloud: A combination of public & private clouds
• Cloud-Connected Appliance: Available as virtual or physical server
Host Anywhere You Need
16. 16
• Ideal for any size business from a Sole Proprietor to any
Multi-National / International organisation, from 1 Gigabyte
upwards
• Affordable and available as HaaS (Hardware as a Service)
• No need to perform upgrades or maintain hardware
• Supports fast RTO (Recovery Time Objective) for minimal
downtime
• Scales with you as you grow: easily add storage space as
needed
Why a cloud-connected appliance?
17. Our Cloud: Safe and Secure
Our data protection solution uses a unique three-tiered encryption
process modeled on the same system used by the U.S. military.
Data is encrypted as follows:
• Locally with system generated key only the end user has access to
• In transit with SSL
• At rest in our Tier 3 & 4 data centers that are monitored 24/7
17
Encryption
Not all cloud-based vendors protect data while it is in transit.
Key
Takeaway
18. Q & A
Do you want to get your PC, Tablets, Smartphones, Servers…
protected? We are offering limited 14 day free trial under our
platform. Get you free trial going now at
https://www.raxsonic.co.za/billing/cart.php
If you are an IT company wanting to provide your clients with a white
label solution contact us on 011 5682365 or send an email to
info@raxsonic.co.za
If you are an IT manager for an organisation and are looking at, or
want to test our solution contact us on 011 5682365 or send an email
to info@raxsonic.co.za or simply register for a Free trial as above.
18
Questions?
Notes de l'éditeur
SQL Server 2008, 2008 R2, and 2012
Exchange Server 2010
Exchange Granular Recovery
Bare Metal backup for Windows-based machines
SQL Server 2008, 2008 R2, and 2012
Exchange Server 2010
Exchange Granular Recovery
Bare Metal backup for Windows-based machines
SQL Server 2008, 2008 R2, and 2012
Exchange Server 2010
Exchange Granular Recovery
Bare Metal backup for Windows-based machines
SQL Server 2008, 2008 R2, and 2012
Exchange Server 2010
Exchange Granular Recovery
Bare Metal backup for Windows-based machines
SQL Server 2008, 2008 R2, and 2012
Exchange Server 2010
Exchange Granular Recovery
Bare Metal backup for Windows-based machines