SlideShare ist ein Scribd-Unternehmen logo
1 von 14
The 5 Components of
Compliant Backups
for Financial Services
Firms
www.bumi.com
Component #1: Security & Encryption

www.bumi.com
Component #1: Security & Encryption

Does the provider have the following:
1.Military grade AES encryption technology up
to 256 bit. FIPS 140-2 certification.
2.LAN security policies that allows data to only
be accessed by those with administrative
rights.
3.User authentication and role-based access

www.bumi.com
Component #1: Security & Encryption

In addition, you should ask:
1.Is the data both transmitted and stored in
encrypted and compressed format?
2.Is there a Client/Server authentication
protocol to ensure that no one can restore
your data to alternate hardware without
authorization?

www.bumi.com
Component #2: Tamper-Proof Storage

www.bumi.com
Component #2: Tamper-Proof Storage

Is the data stored in a tamper-proof,
non-erasable and encrypted format?
WORM (Write Once, Read Many) devices used
to be the standard. But as optical media
became too expensive, the rules were changed
to allow software solutions that encrypt the
data and keep it from being tampered with.
www.bumi.com
Component #3: Audit Trail

www.bumi.com
Component #3: Audit Trail

Does the solution provide:
1.

An audit trail of all backups and restores?

2.

What about destruction certificates of
deleted data?

3.

Serialized originals and, if applicable,
duplicate units of storage media with a
time-date record?

www.bumi.com
Component #4: Archive and Retention Rules

www.bumi.com
Component #4: Archive and Retention Rules

There’s this magical #7 out there…
Everyone thinks they need to keep their data
for 7 years.
The truth is that the rules vary, so it’s
important to have highly customizable archive
and retention rules configured based on
specific business needs.
www.bumi.com
Component #5: 24/7 Availability

www.bumi.com
Component #5: 24/7 Availability

Be sure the solution provides 24x7
availability of encrypted data for
examination by representatives of
regulatory bodies and for emergency
restores.

www.bumi.com
BUMI Background
• BUMI is a premium provider specializing in online
data backup and recovery services
• Focused on professional services market
• Privately owned and self-funded (debt free and
profitable)
• Founded in 2002
• Headquartered in New York City with two leased
SSAE-16 Type I & II data centers located in Canada

www.bumi.com
For more information, visit:
http://bumi.com/customers/financial-services/

sales@bumi.com
212.599.7800
90 Broad Street, FL 6
New York, NY 10004
www.bumi.com

Weitere ähnliche Inhalte

Andere mochten auch

promedio de vida en libia
promedio de vida en libiapromedio de vida en libia
promedio de vida en libiamonse603
 
Selesaikan masalah
Selesaikan masalahSelesaikan masalah
Selesaikan masalahSAFA8889
 
The End of Free Social - Sparkloft Media
The End of Free Social - Sparkloft MediaThe End of Free Social - Sparkloft Media
The End of Free Social - Sparkloft MediaTravel Oregon
 
SIcenterAndProgramSmall01-07-15
SIcenterAndProgramSmall01-07-15SIcenterAndProgramSmall01-07-15
SIcenterAndProgramSmall01-07-15hitoshi ujiie
 
La informacion angiie
La informacion angiieLa informacion angiie
La informacion angiiesaludcoopsur
 
Bahagi pecahan
Bahagi pecahanBahagi pecahan
Bahagi pecahanMohd Ahmad
 
Reglamento general de la UNEFA
Reglamento general de la UNEFAReglamento general de la UNEFA
Reglamento general de la UNEFABetzi Lira
 
General Description Detail Groto
General Description Detail GrotoGeneral Description Detail Groto
General Description Detail GrotoThe House of Perle
 
Presentación Sandra Jaramilli y Aba Bernardi - eModa Day Buenos Aires 2015
Presentación Sandra Jaramilli y Aba Bernardi - eModa Day Buenos Aires 2015Presentación Sandra Jaramilli y Aba Bernardi - eModa Day Buenos Aires 2015
Presentación Sandra Jaramilli y Aba Bernardi - eModa Day Buenos Aires 2015eCommerce Institute
 

Andere mochten auch (14)

promedio de vida en libia
promedio de vida en libiapromedio de vida en libia
promedio de vida en libia
 
Selesaikan masalah
Selesaikan masalahSelesaikan masalah
Selesaikan masalah
 
áLcool(1)
áLcool(1)áLcool(1)
áLcool(1)
 
Tutorial de dropbox
Tutorial de dropboxTutorial de dropbox
Tutorial de dropbox
 
The End of Free Social - Sparkloft Media
The End of Free Social - Sparkloft MediaThe End of Free Social - Sparkloft Media
The End of Free Social - Sparkloft Media
 
SIcenterAndProgramSmall01-07-15
SIcenterAndProgramSmall01-07-15SIcenterAndProgramSmall01-07-15
SIcenterAndProgramSmall01-07-15
 
Cfop remessa para armazenagem
Cfop remessa para armazenagemCfop remessa para armazenagem
Cfop remessa para armazenagem
 
La informacion angiie
La informacion angiieLa informacion angiie
La informacion angiie
 
Bahagi pecahan
Bahagi pecahanBahagi pecahan
Bahagi pecahan
 
Certificate_3
Certificate_3Certificate_3
Certificate_3
 
Hdp chamba mayra
Hdp chamba mayraHdp chamba mayra
Hdp chamba mayra
 
Reglamento general de la UNEFA
Reglamento general de la UNEFAReglamento general de la UNEFA
Reglamento general de la UNEFA
 
General Description Detail Groto
General Description Detail GrotoGeneral Description Detail Groto
General Description Detail Groto
 
Presentación Sandra Jaramilli y Aba Bernardi - eModa Day Buenos Aires 2015
Presentación Sandra Jaramilli y Aba Bernardi - eModa Day Buenos Aires 2015Presentación Sandra Jaramilli y Aba Bernardi - eModa Day Buenos Aires 2015
Presentación Sandra Jaramilli y Aba Bernardi - eModa Day Buenos Aires 2015
 

Ähnlich wie 5 Components of Compliant Backups

eFolder Partner Chat Webinar — Spring Cleaning: Getting Your Clients to Ditch...
eFolder Partner Chat Webinar — Spring Cleaning: Getting Your Clients to Ditch...eFolder Partner Chat Webinar — Spring Cleaning: Getting Your Clients to Ditch...
eFolder Partner Chat Webinar — Spring Cleaning: Getting Your Clients to Ditch...eFolder
 
File Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesFile Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesBlackBerry
 
iOS Application Security Testing
iOS Application Security TestingiOS Application Security Testing
iOS Application Security TestingBlueinfy Solutions
 
#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePodGaret Keller
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentationJMS Secure Data
 
eFolder Partner Chat Webinar — Making the Case for BDR: Communicating the Val...
eFolder Partner Chat Webinar — Making the Case for BDR: Communicating the Val...eFolder Partner Chat Webinar — Making the Case for BDR: Communicating the Val...
eFolder Partner Chat Webinar — Making the Case for BDR: Communicating the Val...eFolder
 
10 questions to ask your cloud provider
10 questions to ask your cloud provider10 questions to ask your cloud provider
10 questions to ask your cloud providerHighQ
 
Pcishrinktofitpresentation 151125162550-lva1-app6891
Pcishrinktofitpresentation 151125162550-lva1-app6891Pcishrinktofitpresentation 151125162550-lva1-app6891
Pcishrinktofitpresentation 151125162550-lva1-app6891Risk Crew
 
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)Precisely
 
Secure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationSecure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationRichard Blech
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredPrecisely
 
Datasheet: Security
Datasheet: SecurityDatasheet: Security
Datasheet: SecurityVoIPstudio
 
Cloud computing web 2.0 By Joanna Hendricks BMT 580
Cloud computing web 2.0  By Joanna Hendricks BMT 580Cloud computing web 2.0  By Joanna Hendricks BMT 580
Cloud computing web 2.0 By Joanna Hendricks BMT 580Joanna Hendricks
 
VeeamOn Session Five Compelling Reasons to Add Cloud Backup and DR to your V...
VeeamOn Session  Five Compelling Reasons to Add Cloud Backup and DR to your V...VeeamOn Session  Five Compelling Reasons to Add Cloud Backup and DR to your V...
VeeamOn Session Five Compelling Reasons to Add Cloud Backup and DR to your V...Dropbox
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, RubrikVMUG IT
 
Trustworthy Records Retention
Trustworthy Records Retention Trustworthy Records Retention
Trustworthy Records Retention Arwa
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudErik Von Schlehenried
 
Rapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdfRapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdfTony Pearson
 
EMC Data Domain Retention Lock Software: Detailed Review
EMC Data Domain Retention Lock Software: Detailed ReviewEMC Data Domain Retention Lock Software: Detailed Review
EMC Data Domain Retention Lock Software: Detailed ReviewEMC
 

Ähnlich wie 5 Components of Compliant Backups (20)

eFolder Partner Chat Webinar — Spring Cleaning: Getting Your Clients to Ditch...
eFolder Partner Chat Webinar — Spring Cleaning: Getting Your Clients to Ditch...eFolder Partner Chat Webinar — Spring Cleaning: Getting Your Clients to Ditch...
eFolder Partner Chat Webinar — Spring Cleaning: Getting Your Clients to Ditch...
 
File Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesFile Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial Services
 
iOS Application Security Testing
iOS Application Security TestingiOS Application Security Testing
iOS Application Security Testing
 
#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
eFolder Partner Chat Webinar — Making the Case for BDR: Communicating the Val...
eFolder Partner Chat Webinar — Making the Case for BDR: Communicating the Val...eFolder Partner Chat Webinar — Making the Case for BDR: Communicating the Val...
eFolder Partner Chat Webinar — Making the Case for BDR: Communicating the Val...
 
Security issues in cloud database
Security  issues  in cloud   database Security  issues  in cloud   database
Security issues in cloud database
 
10 questions to ask your cloud provider
10 questions to ask your cloud provider10 questions to ask your cloud provider
10 questions to ask your cloud provider
 
Pcishrinktofitpresentation 151125162550-lva1-app6891
Pcishrinktofitpresentation 151125162550-lva1-app6891Pcishrinktofitpresentation 151125162550-lva1-app6891
Pcishrinktofitpresentation 151125162550-lva1-app6891
 
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
 
Secure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationSecure Channels Financal Institution Presentation
Secure Channels Financal Institution Presentation
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
 
Datasheet: Security
Datasheet: SecurityDatasheet: Security
Datasheet: Security
 
Cloud computing web 2.0 By Joanna Hendricks BMT 580
Cloud computing web 2.0  By Joanna Hendricks BMT 580Cloud computing web 2.0  By Joanna Hendricks BMT 580
Cloud computing web 2.0 By Joanna Hendricks BMT 580
 
VeeamOn Session Five Compelling Reasons to Add Cloud Backup and DR to your V...
VeeamOn Session  Five Compelling Reasons to Add Cloud Backup and DR to your V...VeeamOn Session  Five Compelling Reasons to Add Cloud Backup and DR to your V...
VeeamOn Session Five Compelling Reasons to Add Cloud Backup and DR to your V...
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
 
Trustworthy Records Retention
Trustworthy Records Retention Trustworthy Records Retention
Trustworthy Records Retention
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloud
 
Rapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdfRapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdf
 
EMC Data Domain Retention Lock Software: Detailed Review
EMC Data Domain Retention Lock Software: Detailed ReviewEMC Data Domain Retention Lock Software: Detailed Review
EMC Data Domain Retention Lock Software: Detailed Review
 

Kürzlich hochgeladen

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 

Kürzlich hochgeladen (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 

5 Components of Compliant Backups

  • 1. The 5 Components of Compliant Backups for Financial Services Firms www.bumi.com
  • 2. Component #1: Security & Encryption www.bumi.com
  • 3. Component #1: Security & Encryption Does the provider have the following: 1.Military grade AES encryption technology up to 256 bit. FIPS 140-2 certification. 2.LAN security policies that allows data to only be accessed by those with administrative rights. 3.User authentication and role-based access www.bumi.com
  • 4. Component #1: Security & Encryption In addition, you should ask: 1.Is the data both transmitted and stored in encrypted and compressed format? 2.Is there a Client/Server authentication protocol to ensure that no one can restore your data to alternate hardware without authorization? www.bumi.com
  • 5. Component #2: Tamper-Proof Storage www.bumi.com
  • 6. Component #2: Tamper-Proof Storage Is the data stored in a tamper-proof, non-erasable and encrypted format? WORM (Write Once, Read Many) devices used to be the standard. But as optical media became too expensive, the rules were changed to allow software solutions that encrypt the data and keep it from being tampered with. www.bumi.com
  • 7. Component #3: Audit Trail www.bumi.com
  • 8. Component #3: Audit Trail Does the solution provide: 1. An audit trail of all backups and restores? 2. What about destruction certificates of deleted data? 3. Serialized originals and, if applicable, duplicate units of storage media with a time-date record? www.bumi.com
  • 9. Component #4: Archive and Retention Rules www.bumi.com
  • 10. Component #4: Archive and Retention Rules There’s this magical #7 out there… Everyone thinks they need to keep their data for 7 years. The truth is that the rules vary, so it’s important to have highly customizable archive and retention rules configured based on specific business needs. www.bumi.com
  • 11. Component #5: 24/7 Availability www.bumi.com
  • 12. Component #5: 24/7 Availability Be sure the solution provides 24x7 availability of encrypted data for examination by representatives of regulatory bodies and for emergency restores. www.bumi.com
  • 13. BUMI Background • BUMI is a premium provider specializing in online data backup and recovery services • Focused on professional services market • Privately owned and self-funded (debt free and profitable) • Founded in 2002 • Headquartered in New York City with two leased SSAE-16 Type I & II data centers located in Canada www.bumi.com
  • 14. For more information, visit: http://bumi.com/customers/financial-services/ sales@bumi.com 212.599.7800 90 Broad Street, FL 6 New York, NY 10004 www.bumi.com

Hinweis der Redaktion

  1. KendraA common compliance mandate (one we’ve seen with HIPAA and SEC 174a) requires organizations to store a copy of their information with at least one offsite third party.Before embarking on this type of relationship with a third-party backup provider, there are several crucial components you must under consideration to avoid headache and ensure a smooth execution and optimal performance in the long-run.
  2. Does the solution provide an audit trail of all backups and restores?What about destruction certificates of deleted data?Serialized originals and, if applicable, duplicate units of storage media with a time-date record?
  3. There’s this magical # out there: 7Everyone thinks they need to keep their data for 7 years.The truth is that the rules vary, so it’s important to have highly customizable archive and retention rules configured based on specific business needs.It’s important to retain data for the specified amount of time, and you don’t want to get caught keeping data too long.
  4. There’s this magical # out there: 7Everyone thinks they need to keep their data for 7 years.The truth is that the rules vary, so it’s important to have highly customizable archive and retention rules configured based on specific business needs.It’s important to retain data for the specified amount of time, and you don’t want to get caught keeping data too long.
  5. 24x7 availability of encrypted data for examination by representatives of regulatory bodies and for emergency restores.