SlideShare a Scribd company logo
1 of 10
Manufacturing
      Peace of Mind



Ace Data Devices Pvt. Ltd.
A G E N D A:


               •   Introduction

               •   Backup process

               •   Recovery process

               •   Software overview

               •   Security and Privacy

               •   Backup Policy
Introducing Ace Data Devices Cloud
based Backup
 At the most basic level, Cloud
 Backup involves the Backup of your
 data into Ace Data Devices’s Backup
 Vault, over Wide Area Network,
 using standard Internet protocols.


 • Hardware Infrastructure is shared –
 increase of efficiencies and reducing
 costs
 • Unlimited amount of storage that is
 highly available, secured and
 inexpensive
 • Flexible allocation of storage
 capacity without limit
The process of performing Backup
to the Cloud:
 • Installation of Backup Vault Client(s) according to the client network
   , number of servers, mix of application, Operating systems and the
   quantity of data to be managed to one or more work stations.

 • Definition of Backup sets (files and databases that are to be backed
   up, eliminating the Backup of unnecessary data) and Backup
   Schedule (if different from the system’s default schedule).

 • Initial seeding and reduction of the low Internet connections speed
   limitations – The first Full Backup (seed) is performed at your site
   where the data is copied on Portable storage device provided by Ace
   Data Devices, at LAN speed. This copy is then transferred to our
   Data Center. Afterwards the Incremental Backups can run smoothly
   via WAN
The process of performing Backup
to the Cloud – security path:




                                Ace Data secures & encrypts the data in-flight &
                                at-rest, from cradle to grave
                                     •   From server to DS-Client to DS-System to
                                         disk to “On-the-Shelf” archive
                                     •   At rest in the DS-System and in the archive
  ALL Ace Data components           •   AES 256 Encryption
   communication is encrypted        •   Customers have their own Private and
                                         Organizational encryption keys
  No open firewall ports
                                     •   Data destroyed based on policy with
  Can’t be hacked                       certificate
                                           of destruction
The process of Cloud Recovery:

 •   In case of massive Recoveries – Files that
     need to be Restored are copied from our Data
     Centre to a high capacity Portable Storage
     device and then transferred to your site where
     the Recovery process occurs at LAN speed.

 •   For normal Recoveries – user friendly and
     simple GUI will guide your administrator
     through the smooth process of selecting the
     data that need to be Restored. The process
     occurs at WAN speed
Software overview:
Security and privacy of your data
Our priority No. 1
 •   AES 256 bit, compliant with SOX HIPPA, Basel II and FIPS
     140-2 compliancy standards, Encryption and Decryption of
     your data

 •   Your data is encrypted before they leave to the Cloud and
     after the arrival

 •   Encryption keys are unique, generated by the Backup Vault
     Client and stored in the database in encrypted form, so even
     in case of full access to the Backup Vault Client they cannot
     be read. This means that eventual modification or loss of the
     encryption key by your side, will make data stored on the
     Cloud unusable

 •   Full 24/7 support from designated Ace Data Devices support
     team
Backup Policy:

 •   The Backup policy is unique for every client and it is adjustable for
     every user, platform and type of data that needs to be Backed up

 •   There are no limitations regarding the type of data that can be Backed up in
     our Data center - Databases, Applications Operating systems, transaction
     logs, MP3 AVI, JPEG files….

 •   There are no limitations considering the supported platforms that the client
     wishes to cover with the solution - Desktop Backup, Enterprise servers
     Backup, laptops, smart phones…

 •   The frequency of the Backup operations is adjustable in accordance to the
     client’s needs (once a day, once a week, twice a day every six hours, every
     hour…)

 •   There are no limitations regarding the time and number of Backup copies
     the client wishes to retain on the Cloud. This is part is also customizable
     and in accordance to the client‘s needs for retaining a suitable number of
     copies (the last copy, the last 2 or 3 copies..)
Backup Policy:

    Example for desktop Backup – Best
                practice
• First full Backup on site on Portable storage device
via LAN which is transferred to Ace Data Devices Data
Center
• Next initial Backup – automatically, after 24 hours
(by default) via WAN
• Backup operation can be scheduled during normal
working time – 09:00 – 17:30 hours (by default)
• At a given moment of time you have:
    Daily copy for 7 consecutive working days - 7
    Weekly copy for 4 consecutive weeks – 4
    Monthly copy for the past month – 1
    7+4+1=12 – the total number of copies available
   for Recovery. The client chooses which one of
   these copy wants to restore (day, week or month
   copy) without any time or availability limitations

More Related Content

What's hot

Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”
Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”
Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”
Emirates Computers
 
Storage, San And Business Continuity Overview
Storage, San And Business Continuity OverviewStorage, San And Business Continuity Overview
Storage, San And Business Continuity Overview
Alan McSweeney
 
IMCSummit 2015 - Day 2 General Session - Flash-Extending In-Memory Computing
IMCSummit 2015 - Day 2 General Session - Flash-Extending In-Memory ComputingIMCSummit 2015 - Day 2 General Session - Flash-Extending In-Memory Computing
IMCSummit 2015 - Day 2 General Session - Flash-Extending In-Memory Computing
In-Memory Computing Summit
 

What's hot (20)

Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
 
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
 
Introducing IBM Spectrum Scale 4.2 and Elastic Storage Server 3.5
Introducing IBM Spectrum Scale 4.2 and Elastic Storage Server 3.5Introducing IBM Spectrum Scale 4.2 and Elastic Storage Server 3.5
Introducing IBM Spectrum Scale 4.2 and Elastic Storage Server 3.5
 
IBM Platform Computing Elastic Storage
IBM Platform Computing  Elastic StorageIBM Platform Computing  Elastic Storage
IBM Platform Computing Elastic Storage
 
Engage for success ibm spectrum accelerate 2
Engage for success   ibm spectrum accelerate 2Engage for success   ibm spectrum accelerate 2
Engage for success ibm spectrum accelerate 2
 
Datacenter overview
Datacenter overviewDatacenter overview
Datacenter overview
 
IBM Spectrum Scale Security
IBM Spectrum Scale Security IBM Spectrum Scale Security
IBM Spectrum Scale Security
 
Azure SQL DB V12 at your service by Pieter Vanhove
Azure SQL DB V12 at your service by Pieter VanhoveAzure SQL DB V12 at your service by Pieter Vanhove
Azure SQL DB V12 at your service by Pieter Vanhove
 
Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”
Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”
Virtualize Your Disaster! Remove the Disaster from “Disaster Recovery”
 
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
 
Trusted DB a trusted hardware based database with privacy and data confidenti...
Trusted DB a trusted hardware based database with privacy and data confidenti...Trusted DB a trusted hardware based database with privacy and data confidenti...
Trusted DB a trusted hardware based database with privacy and data confidenti...
 
Storage, San And Business Continuity Overview
Storage, San And Business Continuity OverviewStorage, San And Business Continuity Overview
Storage, San And Business Continuity Overview
 
JPD1418 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
JPD1418  TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...JPD1418  TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
JPD1418 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
 
Best practices for using flash in hyperscale software storage architectures
Best practices for using flash in hyperscale software storage architecturesBest practices for using flash in hyperscale software storage architectures
Best practices for using flash in hyperscale software storage architectures
 
Spectrum scale object analytics
Spectrum scale object analyticsSpectrum scale object analytics
Spectrum scale object analytics
 
IMCSummit 2015 - Day 2 General Session - Flash-Extending In-Memory Computing
IMCSummit 2015 - Day 2 General Session - Flash-Extending In-Memory ComputingIMCSummit 2015 - Day 2 General Session - Flash-Extending In-Memory Computing
IMCSummit 2015 - Day 2 General Session - Flash-Extending In-Memory Computing
 
SQL Server 2016 New Security Features
SQL Server 2016 New Security FeaturesSQL Server 2016 New Security Features
SQL Server 2016 New Security Features
 
Analytics with unified file and object
Analytics with unified file and object Analytics with unified file and object
Analytics with unified file and object
 
IBM Spectrum scale object deep dive training
IBM Spectrum scale object  deep dive trainingIBM Spectrum scale object  deep dive training
IBM Spectrum scale object deep dive training
 
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
 

Similar to First Cloud based enterprise Backup & Recovery in India

EarthLink Business Cloud Server Backup
EarthLink Business Cloud Server BackupEarthLink Business Cloud Server Backup
EarthLink Business Cloud Server Backup
Mike Ricca
 
Introduction to Data Storage and Cloud Computing
Introduction to Data Storage and Cloud ComputingIntroduction to Data Storage and Cloud Computing
Introduction to Data Storage and Cloud Computing
Rutuja751147
 
RapidScale CloudServer
RapidScale CloudServerRapidScale CloudServer
RapidScale CloudServer
RapidScale
 
SAP Cloud security overview 2.0
SAP Cloud security overview 2.0SAP Cloud security overview 2.0
SAP Cloud security overview 2.0
Rasmi Swain
 
Hosted Revolution Online Backup V2 001
Hosted Revolution Online Backup V2 001Hosted Revolution Online Backup V2 001
Hosted Revolution Online Backup V2 001
Steve Crawford
 

Similar to First Cloud based enterprise Backup & Recovery in India (20)

EarthLink Business Cloud Server Backup
EarthLink Business Cloud Server BackupEarthLink Business Cloud Server Backup
EarthLink Business Cloud Server Backup
 
How To Build A Stable And Robust Base For a “Cloud”
How To Build A Stable And Robust Base For a “Cloud”How To Build A Stable And Robust Base For a “Cloud”
How To Build A Stable And Robust Base For a “Cloud”
 
Introduction to Data Storage and Cloud Computing
Introduction to Data Storage and Cloud ComputingIntroduction to Data Storage and Cloud Computing
Introduction to Data Storage and Cloud Computing
 
Proact ExaGrid Seminar Presentation KK 20220419.pdf
Proact ExaGrid Seminar Presentation KK 20220419.pdfProact ExaGrid Seminar Presentation KK 20220419.pdf
Proact ExaGrid Seminar Presentation KK 20220419.pdf
 
Irm solutions 09 2014
Irm solutions 09 2014Irm solutions 09 2014
Irm solutions 09 2014
 
SoftLayer Storage Services Overview
SoftLayer Storage Services OverviewSoftLayer Storage Services Overview
SoftLayer Storage Services Overview
 
Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
 
cloudcomputing.pptx
cloudcomputing.pptxcloudcomputing.pptx
cloudcomputing.pptx
 
Storage for Microsoft®Windows Enfironments
Storage for Microsoft®Windows EnfironmentsStorage for Microsoft®Windows Enfironments
Storage for Microsoft®Windows Enfironments
 
Webinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it BetterWebinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it Better
 
Webinar: Making The Always-On Data Center A Reality
Webinar: Making The Always-On Data Center A RealityWebinar: Making The Always-On Data Center A Reality
Webinar: Making The Always-On Data Center A Reality
 
RapidScale CloudServer
RapidScale CloudServerRapidScale CloudServer
RapidScale CloudServer
 
Cloud Computing Storage With CubeXS Weatherly...
Cloud Computing Storage With CubeXS Weatherly...Cloud Computing Storage With CubeXS Weatherly...
Cloud Computing Storage With CubeXS Weatherly...
 
SoftLayer Storage Services Overview (for Interop Las Vegas 2015)
SoftLayer Storage Services Overview (for Interop Las Vegas 2015)SoftLayer Storage Services Overview (for Interop Las Vegas 2015)
SoftLayer Storage Services Overview (for Interop Las Vegas 2015)
 
cloud_and_virtualization_concepts.pdf
cloud_and_virtualization_concepts.pdfcloud_and_virtualization_concepts.pdf
cloud_and_virtualization_concepts.pdf
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
SAP Cloud security overview 2.0
SAP Cloud security overview 2.0SAP Cloud security overview 2.0
SAP Cloud security overview 2.0
 
Azure IaaS Tanıtım - Uzun Anlatım
Azure IaaS Tanıtım - Uzun AnlatımAzure IaaS Tanıtım - Uzun Anlatım
Azure IaaS Tanıtım - Uzun Anlatım
 
Hosted Revolution Online Backup V2 001
Hosted Revolution Online Backup V2 001Hosted Revolution Online Backup V2 001
Hosted Revolution Online Backup V2 001
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

First Cloud based enterprise Backup & Recovery in India

  • 1. Manufacturing Peace of Mind Ace Data Devices Pvt. Ltd.
  • 2. A G E N D A: • Introduction • Backup process • Recovery process • Software overview • Security and Privacy • Backup Policy
  • 3. Introducing Ace Data Devices Cloud based Backup At the most basic level, Cloud Backup involves the Backup of your data into Ace Data Devices’s Backup Vault, over Wide Area Network, using standard Internet protocols. • Hardware Infrastructure is shared – increase of efficiencies and reducing costs • Unlimited amount of storage that is highly available, secured and inexpensive • Flexible allocation of storage capacity without limit
  • 4. The process of performing Backup to the Cloud: • Installation of Backup Vault Client(s) according to the client network , number of servers, mix of application, Operating systems and the quantity of data to be managed to one or more work stations. • Definition of Backup sets (files and databases that are to be backed up, eliminating the Backup of unnecessary data) and Backup Schedule (if different from the system’s default schedule). • Initial seeding and reduction of the low Internet connections speed limitations – The first Full Backup (seed) is performed at your site where the data is copied on Portable storage device provided by Ace Data Devices, at LAN speed. This copy is then transferred to our Data Center. Afterwards the Incremental Backups can run smoothly via WAN
  • 5. The process of performing Backup to the Cloud – security path: Ace Data secures & encrypts the data in-flight & at-rest, from cradle to grave • From server to DS-Client to DS-System to disk to “On-the-Shelf” archive • At rest in the DS-System and in the archive  ALL Ace Data components • AES 256 Encryption communication is encrypted • Customers have their own Private and Organizational encryption keys  No open firewall ports • Data destroyed based on policy with  Can’t be hacked certificate of destruction
  • 6. The process of Cloud Recovery: • In case of massive Recoveries – Files that need to be Restored are copied from our Data Centre to a high capacity Portable Storage device and then transferred to your site where the Recovery process occurs at LAN speed. • For normal Recoveries – user friendly and simple GUI will guide your administrator through the smooth process of selecting the data that need to be Restored. The process occurs at WAN speed
  • 8. Security and privacy of your data Our priority No. 1 • AES 256 bit, compliant with SOX HIPPA, Basel II and FIPS 140-2 compliancy standards, Encryption and Decryption of your data • Your data is encrypted before they leave to the Cloud and after the arrival • Encryption keys are unique, generated by the Backup Vault Client and stored in the database in encrypted form, so even in case of full access to the Backup Vault Client they cannot be read. This means that eventual modification or loss of the encryption key by your side, will make data stored on the Cloud unusable • Full 24/7 support from designated Ace Data Devices support team
  • 9. Backup Policy: • The Backup policy is unique for every client and it is adjustable for every user, platform and type of data that needs to be Backed up • There are no limitations regarding the type of data that can be Backed up in our Data center - Databases, Applications Operating systems, transaction logs, MP3 AVI, JPEG files…. • There are no limitations considering the supported platforms that the client wishes to cover with the solution - Desktop Backup, Enterprise servers Backup, laptops, smart phones… • The frequency of the Backup operations is adjustable in accordance to the client’s needs (once a day, once a week, twice a day every six hours, every hour…) • There are no limitations regarding the time and number of Backup copies the client wishes to retain on the Cloud. This is part is also customizable and in accordance to the client‘s needs for retaining a suitable number of copies (the last copy, the last 2 or 3 copies..)
  • 10. Backup Policy: Example for desktop Backup – Best practice • First full Backup on site on Portable storage device via LAN which is transferred to Ace Data Devices Data Center • Next initial Backup – automatically, after 24 hours (by default) via WAN • Backup operation can be scheduled during normal working time – 09:00 – 17:30 hours (by default) • At a given moment of time you have:  Daily copy for 7 consecutive working days - 7  Weekly copy for 4 consecutive weeks – 4  Monthly copy for the past month – 1  7+4+1=12 – the total number of copies available for Recovery. The client chooses which one of these copy wants to restore (day, week or month copy) without any time or availability limitations