How secure is SaaS?
With our technology, customer’s data is encrypted at the highest level – at rest and in motion. Only our customers have access to their data.
Can you provide me with details on your data centers?
Our world-class data centers are constructed to carrier-class specifications. All customer data is stored on state-of-the-art fully redundant hardware, continually backed up, and proactively monitored around the clock. In order to enter the vaulting facilities, personnel are required to meet security clearance. The facilities employ 24-hour security and climate/humidity monitoring to ensure full protection of the hardware and data. Each data center is supplied with redundant power and Internet connections and includes fire protection.
What platforms do you support?
We support Windows, Linux, Solaris, HP-UX, IBM AIX, IBMi, VMWare, and Novell Netware.
What applications do you support?
We support Microsoft Exchange, Microsoft SQL Server, Microsoft Clusters, Microsoft SharePoint, and Oracle.
Is the data encrypted?
Yes, data is encrypted end-to-end. Only a customer with the encryption password can decrypt data. We do NOT have access to customer data. Data can be encrypted during backups using a number of encryption algorithms, including the highest level of encryption, 256 AES. Data can also be encrypted in transit, using 128-bit encryption.
What retentions do you support?
We provide flexible retentions based on a customer needs: 7 days, 30 days, 30 days + 11 monthly backups, as well as custom retentions which are set by the customer. Customers choose a package with retentions that meet their needs.
Do you support deduplication?
Yes. On the front-end, after an initial seed backup, our Delta Pro technology only sends changed or new blocks of data within files to storage. The product then further compresses the data before being sent to the secure server. We further reduce data in storage by eliminating duplicate blocks of data within backup jobs. Together, these technologies significantly reduce backup windows by minimising the amount of data sent into storage and also reduce storage footprints.