Category Archives: Data Security

Should you Trust your Data to the Cloud?

For those who are extremely nervous about entrusting their valuable mission-critical data to strangers over the Internet, Backup Technology Limited (BTL) Cloud Backup is a very reliable option! You can trust your data to BTL professionals without a qualm. BTL has years of experience and a proven track record in data security. The client testimonials and partner stories say it all. If you are still not convinced, here is how BTL works on data security for you.

Your data is secured against access in three ways:

  1. Data is encrypted once at the point of transmission and again at the point of storage. This double encryption makes unauthorised access difficult and even fruitless.
  2. BTL uses superior technology to ensure that your data is backed up quickly and efficiently, and optimally.
  3. Your data is made highly available by replication/mirroring for disaster recovery.

Encryption:

BTL protects data by deploying a 256 bit cryptographic, powered by Asigra, an industry leading cloud backup technology.

The 256 bit cryptographic feature is installed when the BTL software agent is installed on server or computer you want to backup. The installation process prompts the user to input several character strings. The string is then, converted into a 256 bit encryption key and is made available only to the user. It is never transmitted over the Internet and is not stored on the servers of the company. Users are expected to secure this key against deletion and access by unauthorised personnel. Since the data is stored in an encrypted format on the server, the availability of the key is an imperative. Loss of the key implies loss of access to data stored on the servers.

BTL software kick starts when you begin to transmit information over the Internet for secure, encrypted storage on BTL servers. The agent software installed on your computer communicates with the BTL server, using SSL (Secure Socket Layer) technology that deploys its own encryption protocol. This results in a double encryption of the data you finally store. This technology is similar to the technology that is used by banking companies to secure bank accounts of their customers.

High Availability

BTL ensures that customer data is stored securely for high availability and disaster recovery. They monitor the data centres 24/7 with advanced bio-metrically controlled access. Backup generators and redundant Internet connections are used to ensure that customers are never locked out of the server storage if the encryption key, user name and password are available with them. Files in storage are constantly reviewed for ease of restoration, maintenance of user logs, and optimisation of versioning controls.

Software Features

BTL’s technology backs up data, differentially or incrementally at the block level after the first full backup. Users can configure the software to apply to specific data sets as per company policy or on the basis of the importance of the data. This enables users to backup more files during an available backup window and optimise on storage space. Users can also set BTL Cloud Backup and Recovery solution to backup a number of versions of files for compliance and archiving regulations.

Whether you run a big corporation or a small business or you are an IT service providers, BTL offers a secure cloud based data backup solution, combined with a robust partner program, the efficiencies of full web-based account management, and an industry leading technical support team. Visit: www.backup-technology.com

Why BTL’s Cloud Backup Outperforms the Competition?

People in search of great cloud services are always asking the same questions and expecting to find new answers! There are no new questions. There are only new answers. Let us look at some of the common questions that are asked:

  • How does this new technology advantage me?
  • How is it different from the current technology I use?
  • Where will my data reside?
  • Will my data be secure?
  • How will I have control over my data?
  • What kind of tools will I have for managing my data?

Backup Technology Limited (BTL) has not been asked anything significantly different or new. But, it has a lot of new answers to tough questions that are frequently asked. BTL has created a cloud platform that addresses the most recalcitrant problems of customers and resolves them to their satisfaction! This speaks volumes on how BTL has been taking its mission seriously!

The cloud computing infrastructure proposed by BTL Cloud Backup is exciting. BTL is committed to the task it has undertaken. It has partnered with leading technology vendors to provide customer friendly solutions. The integration and interoperability of the product further delivers a combined solution to frequently encountered customer problems and provides a high level of data protection solutions. The methods of deployment, the virtualisation options, simplification of provisioning, application services, increased availability, reduced environmental impact, and business continuity are some, not all, of the compelling reasons for adopting this great technology from BTL.

BTL’s Cloud Backup is an affordable option. It delivers a number of financial advantages to its users. It brings, in its wake, cost advantages and flexibilities that are rarely enjoyed with other IT innovations. Customers signing up for the platform can replace CAPEX with OPEX as the infrastructure is rented not owned. This results in reduced hardware investment and maintenance costs, reduced capacity needs, reduced technology risks, increased productivity, and improved user experience. Furthermore, BTL’s innovative approach to IT supports green computing and accommodates the globalisation aspirations of enterprises.

BTL’s Cloud Backup is easy to deploy. The software almost configures itself and wizard screens guide the user over the humps and bumps of installing and commissioning the software and initiating the backup. Administrators can create, edit, run backup sets, restore and delete files or view user-activity logs from a central management console anywhere, anytime, using a web-browser-based interface that merely requires input parameters for authentication and authorisation. The easy to use dashboard comes with robust features and functionalities, smart defaults for effective and efficient management of your data. The data itself resides in an encrypted format on secure physical or virtual servers that are systematically and dynamically replicated/mirrored for high availability and disaster recovery.

BTL offers multi-level support to users of their cloud platform. Customer satisfaction is very important for BTL and it has shown its eagerness to help its customers by deploying dedicated service personnel.

Customers, who want to know more about how the service works or how they can optimise on the cloud storage platform, can take advantage of the elaborate knowledge base BTL has developed. Trial versions of the software can be downloaded and tested free of charge for a period of 30 days before any buying decisions need to be made!

BTL utilises 256-bit AES security and multiple data centres located on two continents to ensure data protection and availability. BTL offers IT service providers a secure data solution combined with a robust partner program, the efficiencies of full web-based account management, and an industry leading technical support team. Visit www.backup-technology.com

 

Tips to Follow Before Transferring Data to the Cloud – Part II

In Part I of our series, we did list some tips to follow before transferring data to the cloud. Below, in Part II, we will further discuss additional points:

5 – Move First and then Renovate

It is critical to test the migration first and then make a thorough plan. Cloud users are capable of controlling the economies of scale of the cloud, reduce capital spending and save time through selecting cloud just like an application design centre, instead of re-architecting the existing applications and to make it suitable for the cloud. Therefore, it is recommended to refine and improve cloud applications after developing the necessary basic constituents of the cloud.

6 – Crunch the Numbers to Understand Costs

The primary reason to transfer data to the cloud is to save money. It is quite simple to get costs of infrastructure by calculating the used money on vendor support, servers and licenses. However, it is challenging to get an estimate of time spent by the most expensive members of the team. How much time does it take to carry on the legacy systems, solving problems, deleting HR records manually, double entering payroll information, troubleshooting and fixing the application errors on various desktops, and restoring data from backups? If a company has a clear sense of all these types of associated costs, then it is possible to make an assessment of SaaS and hosted solutions; and as a result, the path to the cloud will be very clear.

7 – Security Should be Considered

Security is a huge concern while considering a move to the cloud. In order to stay compliant, you need to look into industry standards. Use third-party sources, such as the Cloud Security Alliance Consensus Assessments Initiative Questionnaire [1] to guide you through the process of understanding potential security pitfalls.

In addition, you need to select cloud storage services that are certified by standards, such as FIPS-140. These solutions offer multiple layers of security and are impossible to hack. Choose a service provider that is well known and respected in the industry, that enforces audit policies on apps and all data stored in its cloud.

8 – Secure your Management Console

The cloud computing console is the life-line of your entire data centre. This means, the management console must always be protected at all times, or else it could be hacked for ransom, as in the case of Code Spaces, which was forced to close after the hackers deleted all of its data when the ransom was not paid.

Finding the Balance Between Value and Cost of Data Protection

The need to align value to cost of data protection is not new. What is new is the pressure for data protection in cost effective ways. The emergence of cloud computing is largely responsible for increasing pressures and redefining ways in which data can be protected.

IT administrators in charge of Information governance strategies in the cloud must:

  • Streamline processes;
  • Reduce costs and risks;
  • Leverage information effectively, and;
  • Evolve effective information delivery protocols.

IT Administrators migrating data to cloud storage servers, begin by assessing the available backup and archiving infrastructures in use and match it with policies and processes to arrive at an understanding of what needs to be done. They prepare a recovery service catalogue that aligns business needs to backup and archive solutions. This leads to the creation of high level architectures for the environment and development of business cases for illustrating current and projected costs, estimated savings and firm recommendations to the management for investing in cloud based backup infrastructures.

Therefore, cloud solution architectures that align value to cost of data protection, are considered to be critical to business processes and decisions that impact organisation growth, risk and profitability. Information optimised cloud backup and storage solutions are built around concepts of appropriate infrastructure, data management and data delivery. Tiered storage and information centric data storage solutions and services that pan across heterogeneous environments are desired for driving down costs and aligning value of data to protection of data. In short, the cloud platform is viewed as a means for storage managers to logically transmit data to secure storage tiers for matching information attributes, establishing enterprise wide business continuity and managing data stores from a central location with user-friendly application interfaces.

Businesses need to take care of their information assets in cost effective ways. Forward-looking organisations take this stewardship seriously and ensure quality, compliance and information protection in the cloud. The cost of data protection is rightly aligned with data protection as they appreciate that data breaches are expensive in terms of reputation, brand image, customer satisfaction and litigation under the different regulations that govern the enterprise. They leverage the best practises of the cloud to meet industry standards and data security objectives. They create value based information governance objectives that clarifies individual roles and responsibilities and provides necessary guidelines for effective management of information in the cloud across the enterprise.

Backup Technology Limited is proud to provide a value-cost balanced cloud backup services to small and large enterprises globally. Why not give our services a try? Contact BTL for more details — www.Backup-Technology.com

How to Share Files Online Securely

It is abundantly clear that the Internet, cloud backup, cloud computing, and data storage are changing the way that businesses operate from the ground up, and the trend shows no sign of slowing down. Through the use of these new modes of technology, everyday more and more small to medium-sized businesses are finding it easier to compete with the big corporations as virtualisation and cloud computing become increasingly affordable, and thus accessible, to everyone. At the very centre of this revolution lie the cloud backup and storage service providers, whose advancements in security, file sharing ability, and collaborative computing continue to lead the way in changing how data is being protected and shared by businesses of all types.

Online data backup company’s servers create a virtualised network that is both easy to access for the user and, in order to avoid the possibility of anyone’s data falling into the wrong hands, security-intense in nature as well. This is achieved through the use of advanced methods of file encryption, both while data is being transferred to and from the online backup company, and while in storage on the online backup company’s servers. The servers themselves are run by special software that effectively restricts data access by creating virtual “road blocks” between the files of all users on the system. In addition to this, users can only gain access through a vigorous authentication process, further ensuring the safety of the all the data on the network.

Storing and accessing your company’s data online offers increased flexibility in being able to allow other users to easily access and edit your files. The versatility in which users can share files online is continuing to grow, with nearly all online data storage companies now offering some level of file sharing capabilities. The end result of this is the virtual network ability between any and all computers, with the restrictions of having to be in physical proximity to any individual that you wish to collaborate with becoming less and less important all the time. In addition to this, companies that are taking advantage of these virtualised cloud storage servers end up appearing to their customers and associates to have vastly larger and quicker databases than they would be able to afford and maintain on their own, further levelling the playing field between smaller and larger businesses.

The control of which files are only accessible by the original author and which ones will be shared with other users on the network is, of course, left entirely up to the subscriber. In fact, once the cloud backup service provider’s software client is installed on a business’s computers, they will instantly have control over a whole host of varying levels of security protocols, including the ability to assign users within their own localised networks, and in the cloud, as well. Clients of cloud backup and data storage can stay on top of what is happening with their data through the ability to monitor who has or hasn’t accessed files. Different files can also receive varying degrees of security measures as well, through the creation of multiple user passwords and special, classified links that can be emailed to individuals for temporary access privileges to specific files and folders specified by the user.

File sharing and cloud based data storage is not without its risks. After all, no matter what complex levels of security are supposedly being used, this is still your data we’re talking about here! For this reason, it is of the utmost importance that you choose an online data backup service provider with a proven track record and state of the art security methods.

Backup Technology Limited is so proud that it has never been hacked in any way. It attributes this mostly to the bank grade level of encryption that it employs to all the data on its servers, ensuring that your files are only shared with those whom you deem fit. For more information, please visit www.Backup-Technology.com

TechTrade Yorkshire - Backup Technology

ClouDRaaS at TechTrade Yorkshire

We are delighted to announce that we are exhibiting at the inaugural Techtrade Yorkshire event at Elland Road in Leeds on September 8th.

The whole day promises to be a great opportunity for everyone working in the IT industry in the region to learn from and network with each other as well as the region’s business leaders.

There are some great speakers lined up and our Disaster Recovery specialists will be on hand on Stand 43 to demonstrate our world-leading ClouDRaaS solution and to discuss the challenges you face around data and your IT infrastructure.

If you would like to book an appointment please click here to give us your details.

You can find out more about event here. Tickets for IT decision-makers are FREE.

Look forward to seeing you there!

@techtradeyorks
#TY16

Our Customers

  • ATOS
  • Age UK
  • Alliance Pharma
  • Liverpool Football Club
  • CSC
  • Centrica
  • Citizens Advice
  • City of London
  • Fujitsu
  • Government Offices
  • HCL
  • LK Bennett
  • Lambretta Clothing
  • Leicester City
  • Lloyds Register
  • Logica
  • Meadowvale
  • National Farmers Union
  • Network Rail
  • PKR

Sales question? Need support? Start a chat session with one of our experts!

For support, call the 24-hour hotline:

UK: 0800 999 3600
US: 800-220-7013

Or, if you've been given a screen sharing code:

Existing customer?

Click below to login to our secure enterprise Portal and view the real-time status of your data protection.

Login to Portal