BCP/DR, Remote Backup and Recovery

Remote Backup and Recovery Services

  

Table of Contents:        
Introduction        
Remote Backup and Recovery - Service Types     Benefits of our Remote Backup and Recovery Services
How the Services Work     Compliance Security Statement

Introduction

Remote Backup and Recovery services are a key component of Business Continuity Planning (BCP) and Disaster Recovery.  Gaining access to your business's mission critical services and data are necessary to survive many of the human created and/or natural disaster events that can occur.

Regulatory compliance legislation mandates for businesses that fall under the compliance umbrella to have BCP and D/R plans in place.  Street wide exercises are conducted within the financial services industry and other sectors of business may require yearly internal and external auditing mandates to demonstrate compliance to the enacted legislation such as: HIPAA, SOX and GLBA.

Our Remote Backup and Recovery services are in-line with the legislative mandates supporting:

  • Strong user login account and password authentication
  • Data encryption based on industry standards post sending over local area network or Internet service access point
  • Data is housed in encrypted format to guard against unauthorized access
  • Remote Backup and Recovery Services are available 7 x 365 from anywhere

  

Table Of Contents

  

Remote Backup and Recovery Service Types

There are two ways in which Remote Backup and Recovery Services are provisioned:

  • Client based licensing:
    • Client based licensing is the total number of computer systems identified to run the Remote Backup and Recovery services
    • This option may be appealing to business who have stand alone computers in their environment with no centralized server support
    • This option may be appealing to business who have existing backup and recovery capabilities in their environment but are looking for expanded capabilities
    • This option is appealing to home based business who do not typically have servers or backup and recovery capabilities available
    • This option is appealing to students who use their home computers as a supplement to their educational curriculum
    • This option is typically chosen by business with less than five computers in their environment
  • Server based licensing
    • Server based licensing is the total number of servers identified to run the Remote Backup and Recovery services
    • Server based licensing is appealing to business how greater than five computers within their environment as they typically store data centrally onto the server
    • Server based licensing is appealing to business who have to comply with HIPAA, SOX and/or GLBA compliance legislation
    • Server based licensing is appealing to business as a supplement to their existing backup and recovery capabilities
    • In certain instances, this option may be appealing to home users and small home based businesses

  

Table Of Contents

  

How the Services Work

The first step in the process is to have the Remote Backup and Recovery application installed and configured on the targeted systems.  The Remote Backup and Recovery application runs like any other standard Microsoft Windows service.

The following scenario is a high level process of what happens when remote backups are performed.

  • After business hours - A scheduled task begins to run on the target computer
  • The task wakes up the backup agent
  • Based on a pre-defined listing of file types, directories/folders and/or network shares, the agent identifies what is necessary to backup
  • Backup definition types are:

    • Incremental Backup

      Backs up all files that have changed since the last time a full, differential or incremental backup was performed.

      Incremental backups are faster than running full backups.  However, recovering data from incremental backups is slower since you have to recover the last full backup and then apply each incremental restore until the Recovery Point Objective is achieved.

    • Differential Backup

      Backs up all files that have changed since the last time a full backup was performed.

      Differential backups are faster to recover from than a full or even an incremental backup.

    • Bit Backup

      Bit level backups are the fastest in backup time of all backup methods.

      Bit level recovery is slower than incremental and differential as you need to restore the file from the last full backup and then apply each bit level restore until the Recovery Point Objective is achieved.

    • Full Backup

      As the name implies, full backups capture all data and sets the watermark time stamp as the starting point for all subsequent incremental, differential and bit level backups.

      Full backups take the longest time to complete and recover from.  The win of doing full backups is you don't have to apply any other backup restores to obtain your Recovery Point Objective

      Although the most efficient backup scenario type, it may not always be prudent to run full backups exclusively.  Data sizes and network bandwidth will determine what is the maximum data volume that can be backed up via a full backup method.  Many variables will influence the capacity and efficiency of a conducting a full backup.

  • The targeted backup files are encrypted and password protected using industry standard encryption methods with a key that only you have access to:
  • Encryption Standards Supported

    • DES 8.2 Compatible
    • DES 8.3 Standard
    • TDES (Triple DES)
    • Blowfish Variable Key (448 bit)
    • AES 128
    • AES 192
    • AES 256 (Most secure but slow)

  • All files are then compressed for secure and quick transmission to the off-site remote backup server
  • At the end of the file preparation process the agent activates a communication session using your companies login ID and secured password
  • Your backup agent talks to our remote backup server agent
  • The two computers exchange security information and your agent begins sending files identified for the backup to the remote backup server until completion

Your daily backup has been completed!  The backup agent goes back to sleep and all your company's mission critical data is safely stored off-site in our secured data center.

The following morning an email message is forwarded to you stating the success of the backup service; how much data was backed up and how much disk storage space you are consuming on the backup server.

There are multiple service levels offered to on access your data:

  • On line - Always available, on demand, anytime, any day
  • Off line - Tape backup stored locally as an offline service.
    • Available during business hours requiring our intervention for restoration
    • Available within 48 hours of request for restoration
  • Off line / Off site - CDROM backup copy of your data stored off-site in our bank vault
    • Available within 72 hours of request for restoration

  

Table Of Contents

  

Benefits of our Remote Backup and Recovery

  • Fully automated, set it and forget it!
  • Once installed and configured requires no human intervention
  • Runs during off-peak hours of your business, you control the scheduling
  • Your data is immediately sent off-site
  • Encrypted and secure communication to the remote backup server
  • Data stored on the remote backup server remains in its encrypted form
  • You don't have to verify that the backup worked, all the guess work is taken out of verification with notification to you upon successful backup
  • Your data is available for recovery any time, from anywhere

  

Table Of Contents

  

Compliance Security Statement

Security and confidentially are the corner stone of our services and a top priority of our product offering.  The data stored on the remote backup sever can never be accessed by anyone other than you.  The data stored on our remote backup server remains in its encrypted form using your private encryption key before it is delivered to the remote backup server.

Only you have the password and encryption key to unlock your data.  No one can view your data, nor recover the data as we do not store your encryption key.  We provide you with utilities to help you manage your encryption key for safe keeping.

  

Table Of Contents

  

 

BCP/DR, Remote Backup and Recovery Home | About Us | Privacy Policy | Contact Us | Copyright © 2000 - 2017.  FR Technologies, LLC.   All rights reserved.