Backup

An average business can lose hundreds of thousands of Dollars when hit by a ransomware attack. What’s worse is that the businesses very often fail to recover their entire data that has been encrypted and inaccessible to them. And not every organization is able to regenerate or re-enter their data, leading to a complete or partial collapse of their operations, as they lose credibility in the market. The impact is generally a long-term disaster

Backup

An average business can lose hundreds of thousands of Dollars when hit by a ransomware attack. What’s worse is that the businesses very often fail to recover their entire data that has been encrypted and inaccessible to them. And not every organization is able to regenerate or re-enter their data, leading to a complete or partial collapse of their operations, as they lose credibility in the market. The impact is generally a long-term disaster

Backup

Consider a situation where you are responsible for managing and protecting data for a medium or large enterprise. One of your key system admins leaves your organization, and while a new employee takes over, you continue to be busy with your daily deluge of tasks, assignments, incidents and reports. One fine day, you get informed that your admins can no longer access your storage management interface. Your hosts continue to access storage. You consider it a case of lost or misplaced passwords, and assign someone to try and retrieve passwords from ex-employees or from flat excel sheets. Crucial days pass by, and one day, the iscsi authentication begins to fail and your iscsi hosts are unable to access the target datastores. Sometime later, you receive an email claiming that your organization has been hit by ransomware attack and you need to meet the attacker’s monetary demands before you can get access to your storage. You immediately begin closing down your network but to no avail. The attackers have changed the encryption keys as well, and moreover, you have lost access to your backup storage as well. Disaster!! This is a case where an organization underestimated “Insider’s Threat”.

An average business can lose hundreds of thousands of Dollars when hit by a ransomware attack. What’s worse is that the businesses very often fail to recover their entire data that has been encrypted and inaccessible to them. And not every organization is able to regenerate or re-enter their data, leading to a complete or partial collapse of their operations, as they lose credibility in the market. The impact is generally a long-term disaster. And unfortunately, many organizations do not or are unable to invest in comprehensive data protection solutions. Data stored in public clouds adds to the complexity since many conventional backup solutions do not offer the functionality to backup cloud data.

Threat to Business

Image by Markus Spiske

Almost every organization generates, maintains and stores business related data in one form or the other. It can be in the form of simple office files or could be critical financial data growing by the second, stored in a large OLTP database. Data is generally considered a most important asset, and it is difficult to assign a value to an event of data breach or data loss. And nowadays, enterprise data has become a favorite target for ransomware attacks. This adds to the requirements for data security. Data protection, availability and recoverability is also a key requirement for compliance and business continuity. Data can be compromised, stolen or be lost in many different ways and it is up to the IT Directors, CIOs and IT managers to ensure that they deploy a robust Data Backup management policy. A comprehensive Data protection plan does not merely comprise of preventive measures like edge or core firewalls and IPS systems, but also robust and effective data backup, backup protection and replication.

Solutions

Our company has been planning, designing and implementing enterprise backup solutions for over a decade. With partnerships and certifications of many OEM vendors that sell enterprise backup solutions, we have the skills and experience to protect enterprise data located on-premises, at remote sites or sitting in the cloud. We have been rendering managed backup services for many years to enterprises and corporates. Recently we have signed up as a Backup & DR Managed Service provider for VeeAM, to add to our broad portfolio of Data backup solution offerings which already include IPB and Dell/EMC Networker. Please click here to view our latest BaaS/DRaaS offering.

rtaImage.png

Sample Deployment of an on-prem backup solution

Client Profile: One of the largest Regional Telecom Operator Country Head Office & Data Center

Client Business Requirement: To obtain a comprehensive Data Backup & Recovery Solution for a Heterogeneous environment, that included a multitude of Operating systems (HP UX, RHES, Windows, VMWare etc) running a wide range of applications from SQL, Oracle to Custom Applications. 

veembackup-sol1.png

Client type: Telco
Client Business Requirement: To obtain a comprehensive Data Backup & Recovery Solution for a Heterogeneous environment, that included a multitude of Operating systems (HP UX, RHES, Windows, VMWare etc) running a wide range of applications from SQL, Oracle to Custom Applications.

 

Solution Provided: 

  1. Our BAR (Backup & Archiving) team planned & designed a comprehensive Data Backup Solution based on EMC Networker Backup software and utilizing EMC Data Domain Dedupe Disk with VTL License enabled

  2. The solution entails a Backup To Disk To Tape architecture

  3. Most backup is done over FC SAN fabric utilizing FC SAN speeds without putting any load on production networks.

  4. A Dedicated Backup Network is created for backing up client servers over a high speed ethernet LAN where necessary.

  5. Complete Delivery and on site implementation conducted by our team along with necessary skills transfer.

  6. A Managed Service - Currently being supported through a comprehensive Service Level Agreement.

Get Started Today!

Get a quote from us for Solutions Engineering