Data Protection

Business continuity planning typically begins with data protection. The best protection from complete or partial data loss is to make copies of the data and store at least one copy at an off-site location. This is the basic principle behind all backup strategies.

You may already have a back-up plan for your data, but is it cost effective? Safe? An assessment of your business continuity plan could reveal areas where you might save on your back-up strategy. In addition, it is important to use a data protection service that will allow you to quickly restore business operations.

We provide an online data backup solution that is efficient and reliable. Offsite servers are “told” to back up your data based on parameters you’ve established. This client/server architecture works seamlessly in the background and operates over your existing bandwidth with minimal impact on your network.

We are committed to delivering superior backup and restore services with the highest levels of security and encryption. We offer some of the highest encryption options in the industry.  In addition, our secure data vaults are housed in premier collocation facilities which maintain 99.999% power and internet bandwidth availability.

Benefits include:
  • Simple and immediate restoration with 24/7 access to your data
  • Customer-oriented technicians who have been tested and certified by leading technology infrastructure providers
  • Low upfront cost, no need for equipment purchases or license fees
  • Fast data restoration
  • Ease of use
  • Simple graphic interface

90% of backup systems are misconfigured and are not operating according to planned specifications.
--Technology on Premises

25% of all PC users suffer from data loss each year.
--Gartner

How Does It Work

diagram

1. Software Installation

We install our agentless software solution onto one device (server or desktop) on your LAN. It will only need to be loaded once and typically takes about 20 minutes. An agentless client (see diagram) does not require agents to be installed on each server.

2. Automated Schedule & Retention

During installation, you decide start time, frequency and time limit of your automated backup as well as number of versions you want stored in your vault. Each version represents the status of the data at the point in time of the backup, capturing any changes since the last backup. Once the maximum number of versions has been reached, the next backup will force a merger of version #1 in to the main body of data, making that the new version of the Initial Backup.

3. Initial Backup

The initial backup (also known as the “seed”) is the process of sending all client selected data to the data vault in its encrypted and compressed format.

4. Encryption & Compression

Once new data has been found for backup processing, the client software will compress and encrypt the data and transfer that information to be established as a generation. All data is encrypted using government approached encryption algorithms.

5. Data Transfer

The encrypted data is transferred over your existing Internet connection to our secure Data Vault. Our goal is to provide our clients with a reliable backup and recovery solution, and replicate your copy for an additional backup.

Note: For compliance and regulatory reasons Nauticon cannot reset encryption keys, nor does Nauticon retain encryption keys for end-users.