Articles

Data BackUp Now 100x Faster, Claims Symantec

Symantec revealed new versions of their flagship NetBackup enterprise-class and Backup Professional midrange backup programs — Backup Professional 2012 and NetBackup v7.5.

Vijay Mhaskar, V . P ., Information Management Group stated that worldwide backup teams are frustrated with skipped backup home windows and non-integrated solutions for physical and virtual backup copies, deduplication and pictures.  Presently organizations face a scenario where recovery, the finish goal of why backup copies exist, is complex and unnecessarily costly.

“Our survey of just one,425 organizations worldwide implies that only 28 percent from the information mill completely certain that 100 % from the backed-up data could be retrieved, virtualization backup ranks second cheapest of effective IT initiatives because the complexity demands more agile systems.” states Mhaskar

The NetBackup v7.5 for that bigger businesses includes features such as the integration of incremental backup copies and deduplication to reduce I/O bandwidth and lower time required for backup copies, in addition to to offer eDiscovery without getting to first replicate data right into a separate repository.

“Our tests around the new system versus existing techniques pf backup reveal that a 61GB file being backed up from US to china which earlier required about 4 hrs 18 minutes 7 seconds now takes only one minute 33 seconds,” states Mhaskar.

Symantec also introduced an broadened partnership with NetApp to integrate with NetBackup Replication Director, enabling clients to unify Snapshot and backup management, and take away the price and risk connected with multiple backup and recovery tools

The V-Ray Edition of NetBackup v7.5 can back up data on virtual machines running either VMware or Microsoft’s HyperV. Furthermore, backup managers can also add physical machines to V-Ray’s backup capacity policy and manage both conditions via a single console view.

The update adds a brand new feature known as Virtual Machine Intelligent Policy (Very important personel) to NetBackup v7.5 , that may instantly identify and back up new, moved, or cloned virtual machines, using deduplication to reduce the quantity of data saved. Again, physical machines could be added to the virtual machine backup copies.

According to Symantec, many companies face the issue of cost exposure caused by over retention of backup tapes.  NetBackup Search identifies what information to archive and what to remove according to relevance to legal discovery or compliance cases.

Symantec stated additionally, it added bare metal backup copies and restore disaster recovery abilities into Backup Professional 2012, which permit a unsuccessful system to be retrieved to an actual server, or to a Hyper-V or VMware machine. The brand new disaster recovery features also allow entire virtual machines, single files, Active Directory objects, Exchange Emails, or SharePoint Documents from the single-pass physical, VMware or Hyper-V backup to be retrieved.

The NetBackup Accelerator feature functions by copying only incremental file changes individuals incremental file changes are then also deduplicated to further reduce network traffic. When Accelerator can be used to recover data, we have an index that enables it to rapidly restore single documents or files.

“The system monitors the files which have transformed and also the blocks which have transformed within individuals files. Then when a backup is performed, the machine knows what blocks to back up and where they’re,Inch stated Mhaskar.

By the certification policy stands on the SaaS model or can be purchased around the capacitive certification model. The organization needs the items to be accessible by before summer 2012.

“Companies have enough money the quantity of data they decide to store around or pay on the per machine license policy,” Mhaskar clarified.

symantec-logo

Data BackUp Now 100x Faster, Claims Symantec Read More »

Work in Forensics: 5 Key Steps

Work in Forensics: 5 Key StepsJoseph Naghdi, an experienced computer technologist, transitioned to digital forensics in early 2000 because he was intrigued by how data is stored and discovered on computers. Today, he’s a forensics analyst at Computer Forensics Lab, a U.K. consultancy specializing in computer forensic services and advanced data recovery. The high point of his work, he says, is when he solves tough cases, such as a recent phishing attack against a UK bank that almost led to the transfer of 3 million pounds.

With the rise in cyber-fraud and various breach incidents, digital forensics is becoming a growing field with plenty of opportunities. The job involves determining the cause, scope and impact of security incidents; stopping unwanted activity; limiting damage; preserving evidence and preventing other incidents. Digital forensics experts typically investigate networks, systems and data storage devices.

The average salary for digital forensic professionals is about $81,000 in the U.S., according to the salary research and data website PayScale, but specialization in mobile architecture, devices and cloud computing could lead to higher salaries.

Information security professionals interested in making a transition to a career in digital forensics, as Naghdi did, need to take five key steps, experts say.

1. Develop Windows Expertise
Because 90 percent of the systems that forensics experts investigate are Microsoft Windows-based, practitioners need to understand the core technology, says Rob Lee, director and IT forensics expert at Mandiant, a certified forensics instructor at SANS Institute.

“Kind of like in the Army, you need to know how to shoot a rifle – Windows is the rifle of computer forensics,” Lee says. Information security professionals who want to specialize in forensics must understand all aspects of how Windows works, including how information is stored, he contends. He also suggests developing expertise in mobile devices and cloud computing.

2. Obtain Specialized Training
Greg Thompson, security manager at Canada’s Scotia Bank, who is also an (ISC)2 advisory board member, believes the best way to learn about digital forensics is to obtain training at schools or certification bodies, including the International Association of Computer Investigative Specialists, Sans Institute and the International Information Systems Forensics Association.

Thompson recently hired two professionals from community colleges in Canada who were trained in applying forensic investigative techniques and skills. “The main skill is developing a creative mind-set to think like an attacker in responding to the situation,” says Thompson, who oversees the forensics practice at Scotia Bank.

He also recommends security professionals take online courses, seek help from professionals with law enforcement backgrounds and learn on the job. In particular, he encourages developing expertise in forensic investigations of mobile devices, firewalls and malware.

3. Build a Broad Technical Background
When investigating unauthorized data access, for example, forensics experts must know how to recover lost data from systems, analyze log entries and correlate them across multiple systems to understand specific user activity. “This requires a solid understanding of networks, systems and new types of malware intrusions and analysis,” says Marcus Ranum, CSO at Tenable Network Security. “Only a broad IT exposure can help professionals understand the different types of data and what is most critical to capture.”

Naghdi emphasizes the need for good computer programming skills to understand how data is stored and how hard disks operate. “Strong programming skills often help the forensic expert in understanding and discovering the different ways of storing and recovering data,” he says.

4. Gain Legal Knowledge
Forensics specialists need to understand breach notification regulations as well as the legal implications of not maintaining a proper chain of data custody. They also need to understand, for example, how a cloud computing provider will identify, locate, preserve and provide access to information when the need arises, as well as how to legally preserve data for litigation purposes. “More and more practitioners need to understand the legality around data retrieval, storage and protection,” Lee says.

5. Understand Upstream Intelligence
Gathering upstream intelligence involves such steps as observing outgoing messaging patterns or filtering infrastructure for suspicious source rules or inappropriate user behavior. This may provide significant insights into the security posture of an organization.

Forensics goes far beyond relying on recovering pictures, data and e-mails in order to solve a case. “We now require professionals to be engaged in intelligence gathering and analysis and to work across multiple machines, different environments and devices, which could lead to investigating advanced hackers that are moving within the organization,” Lee says.

Complexity of Investigations
Digital forensic investigations are becoming far more complex.

For example, Lance Watson, chief operating officer and forensic investigator for Avensic, a forensics and e-discovery consulting company, tackles such challenges as locating information in the cloud or helping clients track and analyze e-mails and text messages on mobile devices. “It’s become harder to investigate user activity or discover digital evidence quickly because of remote locations and multiple storage devices used,” he says.

The growth in cloud computing and mobile devices has further strengthened the market for forensic pros by increasing demand for eDiscovery services, which involve preserving, collecting, managing and producing electronic evidence relevant for a court case.

The demand for eDiscovery services is leading many companies to establish an internal eDiscovery team rather than relying on an outsourcer. And this is creating new job opportunities. For example, Thompson of Scotia Bank recently transitioned from outsourced eDiscovery to an in-house forensics and data recovery team largely to gain cost savings and get better control of investigations and data.

Naghdi of Computer Forensics Lab says information security professionals can expect demand for forensics experts to grow. “There is definitely an uptake in hires for forensic experts, and this trend will continue,” he says. But to make a successful transition to a role in forensics, Naghdi says, security professionals must “have an inquisitive mindset to find new ways of exploring emerging areas and finding digital evidence.”

Work in Forensics: 5 Key Steps Read More »

Ontrack Announces New SSD Recovery Technology

Kroll Ontrack data recovery has announced that it has developed unique, proprietary capabilities to drastically improve the quality of data recovery from SSDs in less than a quarter of the time usually required. Engineers at Kroll Ontrack had to overcome a number of obstacles associated with flash media to develop these capabilities.

Data recovery from new technology can be very time-consuming because of the need to research the algorithms used to originally store the data; however, new capabilities from Kroll Ontrack automate many of the processes involved. As a result, it ensures a significantly more efficient recovery for a fast-growing market.

ssd-recoveryWear leveling is also a primary difficulty of data recovery from solid state media. It is a technique that balances usage evenly across all disk sectors to ensure the maximum functional life of the media because SSDs generally have a finite number of read/writes before they become unstable. If a media failure occurs, however, wear leveling creates a time-consuming process to piece the data back together.

Another hurdle for data recovery on SSDs is that individual memory chips on devices usually work in a RAID-like configuration, making data even less contiguous and more difficult to piece together in the event of a failing device malfunction or data corruption. Additionally, there are no standardized configurations across manufacturers; this means that the new SSD recovery capabilities need to be able to handle many forms of Error Checking & Control (ECC) and Correct Address Translation via Logical Block.

Ontrack Data Recovery experts conducted extensive research into SSD technology to create these new capabilities that address these issues. This resulted in an in-depth understanding of this media, which enabled the development of unique processes and procedures with the ability to improve recovery rates decreasing the average time per data recovery.

Ontrack Announces New SSD Recovery Technology Read More »

Heat Makes Data Storage Faster

A new way of magnetic recording using heat will allow data processing hundreds of times faster than by current hard drive technology, – British researchers say.

International research led by the physics department at the University of York found heat could be used to record information onto magnetic media at a much faster rate than current technologies, a York release said Tuesday.

“Instead of using a magnetic field to record information on a magnetic medium, we harnessed much stronger internal forces and recorded information using only heat,” York physicist Thomas Ostler said.

“This revolutionary method allows the recording of Terabytes (thousands of Gigabytes) of information per second, hundreds of times faster than present hard drive technology. As there is no need for a magnetic field, there is also less energy consumption.”

Until now it has been believed that in order to record one bit of information — by inverting the poles in a magnetic medium — there was a need to apply an external magnetic field.

The researchers demonstrated the positions of the poles of a magnet can be inverted by an ultrashort heat pulse, harnessing the power of much stronger internal forces.

“For centuries it has been believed that heat can only destroy the magnetic order, now we have successfully demonstrated that it can, in fact, be a sufficient stimulus for recording information on a magnetic medium.” ” said Alexey Kimel of the Radboud University Nijmegen in the Netherlands.

Heat Makes Data Storage Faster Read More »

Fujitsu Data Recovery Services

Data loss can result from many causes. These can include virus attacks, system malfunction, or human error in the handling or installation of the drive. Fujitsu highly recommends that users take standard measures to protect their data, the most important of which are frequent and regular backups, and diagnostic checks of your drives.

The list of Data Recovery Companies below are recognized by FCPA. If you utilize one of these companies for your data recovery needs, FCPA will not void your products warranty related to this activity. In all other instances, FCPA will void the product’s warranty if, when returned, it exhibits tampering and/or alterations (Please see our warranty exclusions statement).

Any agreement you may reach with one of these companies is a matter between you and the company you have selected. FCPA does not warrant the services provided by these companies and cannot be held liable for any damages or unsatisfactory performance.

DriveSavers
Tel: (800) 440-1904
Fax: (415) 883-0780
Website: www.drivesavers.com

Ontrack Data International, Inc.
Tel: (800) 872-2599
Fax: (952) 937-5815
Website: www.ontrack.com

Fujitsu does not itself perform data recovery services, nor does it recommend or authorize any specific data recovery company or its services.

If you have questions regarding your product’s warranty, you can call 888-664-0672.

Fujitsu Data Recovery Services Read More »

Cleversafe Launches 10 Exabyte Data Storage System

Enterprises are now routinely storing workloads comprised of terabytes of data, which eventually add up to petabytes of storage. Next stop? Exabytes.

We’re going to be hearing the preface “exa-” as it refers to the data storage industry a lot more as time goes on, so we might as well get used to it.

A current illustration of this point is object-based storage provider Cleversafe, which launched a new multi-rack array system Jan. 30 that can hold billions of objects inside up to 10 exabytes of capacity.

That’s a serious amount of space. While some people describe it as limitless, it isn’t—but it’s pretty close.

For those who would like to see the actual numbers that describe just 1 exabyte, here they are:

1 exabyte = 1,000 petabytes = 1,000,000 terabytes = 1,000,000,000 gigabytes = 1,000,000,000,000 megabytes = 1,000,000,000,000,000 kilobytes = 1,000,000,000,000,000,000 bytes.

Terabyte Loads Now Routine

Enterprises are now routinely storing workloads comprised of terabytes of data, which eventually add up to petabytes of storage. All those packs of petabytes also pile up as time goes on, so what’s the next level of storage needed? Right: exabytes.

Realistically, only the true high-end enterprise systems—such as those deployed by scientific researchers, online game providers, digital video studios, stock markets, government and military installations and high-end financial services companies—are using petabyte-type storage now and will be looking at exabyte-able storage in 2012 or 2013.

But Chicago-based Cleversafe is one storage provider that figures no time is better than the present for planning for the future.

In its new 10-exabyte configuration, Cleversafe uses the same object-based dispersed storage system it developed on its own six years ago; only now it has been expanded to allow for independent scaling of storage capacity through what it calls a “portable datacenter,” a collection of storage and network racks that can be easily deployed or moved.

Each portable datacenter contains 21 racks with 189 storage nodes per PD and forty-five 3TB drives per storage node. This geographically distributed model allows for rapid scale and mobility and is optimized for site failure tolerance and high availability, Cleversafe said.

The company’s own configuration includes 16 sites across the U.S. with 35 PDs per site and hundreds of simultaneous readers/writers to deliver instantaneous access to billions of objects.

Traffic Volumes Increasing at 32 Percent Rate Per Year

“Internet traffic volumes are increasing at a rate of 32 percent globally each year. It’s not unrealistic to think companies looking to mine that data would need to effectively analyze 80 exabytes of data per month by 2015,” said Russ Kennedy, Cleversafe vice president of product strategy, marketing and customer solutions.

“To any company, data is a priceless component. However, it’s only valuable if a company can effectively look across that data over time for trends or to analyze behavior and to do it cost effectively.”

Pricing and other information can be obtained on an individual basis via email or on the Cleversafe Website.

Cleversafe Launches 10 Exabyte Data Storage System Read More »

Tips for Buying IBM Storage

Tips for Buying IBM StorageIBM has been in the data storage business since before the advent of computers. Over the decades it has developed a broad storage portfolio that includes tape, disk, SAN and NAS. But more important than just the hardware is the intelligence added to easily and efficiently manage the growing storage capacity.

“Long gone are the days when storage was about ‘how much spinny stuff do you want? Clearly the media plays a role, but it is much more about the software DNA we are bringing than the hardware physicality.” said Doug Balog, IBM’s Vice President and Business Line Executive, Storage Systems.

He said that storage intelligence is increasingly important as IT departments are caught between the demand to provide faster access to larger amounts of data and the demand to keep budgets flat. This necessitates the use of deduplication and compression to reduce the amount of hardware required and automatic tiering so hardware is put to the best use.

With more than 150 storage products, it is impossible to cover IBM’s entire product line in a single article, but here are some of the highlights.

IBM Tape

    Despite regular reports of its imminent demise, tape, like the mainframe, is still here and continues to find new applications.

“Tape is still the greenest tech for long-term repository of data: It consumes no energy, and there is no carbon footprint, what we have done is extended tapes usefulness with a technology called LTFS (Linear Tape File System), which addresses one of the challenges tape has had — how do we find that critical piece of information on a tape cartridge that is now holds 5TB” said Balog.

This development makes tape not just useful for offsite archiving, but also for nearline storage of large amounts of data for media and high performance computing applications. In October 2011, IBM and Fox News Group even received an Emmy “for media workflow transformation and pioneering the development and application of LTFS in a broadcast environment enabling real-time content recording and high-speed recovery of content leading to a broadly supported multi-industry solution.”

LTFS is built on the Linear Tape-Open (LTO) Ultrium5 format standard and allows users to search, read and write to IBM tape libraries with the existing OS file interface without the need for additional tape management software.

“LTFS allows some metadata to be tagged to the file at the time the data is written, the tape starts to act like a disk and looks like just another drive to the server.” said Balog.

IBM has entry, midrange, and enterprise tape libraries and drives ranging from the 1U TS2900 Tape Autoloader Express with a single drive and nine cartridges up to the TS3500 Tape Library, which has up to 192 drives per library and 2,700 drives per complex.

The Crossroads Read Verify Appliance monitors the utilization, performance and health of the tape drives to improve performance, reduce the risk of restore failures and provide an audit trail for regulatory compliance.

IBM Virtual Tape Servers

IBM also offers virtual tape servers for the entry, midrange and entry markets. The IBM Virtualization Engine TS7700 is a family of mainframe virtual-tape solutions designed to optimize tape processing, with a RAID array cache up to 115TB and up to 64 tape drives.

IBM appliances and ProtecTIER deduplication gateways reduce storage needs by up to 25 to 1. The entry-level TS7610 is for weekly full backups of up to 3TB and daily backups up to 1TB. For enterprises, the TS7560G ProtecTIER Deduplication Gateway provides sustained inline deduplication for backups at speeds up to 7.2TB/hr (2000 MBps). For mainframes, the TS7680 ProtecTIER Deduplication Gateway for System z has two-node clustering for high availability and up to 1PB of storage capacity per system.

IBM Disk Systems

XIV is a high-end storage system with a massively parallel grid structure that is optimized for virtual and cloud storage applications. Last year, IBM released XIV Gen3, which includes InfiniBand interconnections, 8 Gb/sec Fibre Channel ports and an increase in memory from 16 GB to 24 GB per module. It comes with 72 TB to 180 2 TB or 3 TB SAS drives. Administrators can monitor and manage the XIV through an iPad.

“XIV has a lot of IBM research assets in it now, which it didn’t have when we acquired it four years ago, It is a great product in terms of the intelligence it has built into it around the way it thin provisions all the LUNS and the way it distributes the data in an intelligent way to maximize the utilization and efficiency of the system.” said Balog.

While the XIV is designed for enterprise applications, IBM adapted some of its technology for the mid-market with the Storwize V7000 Unified, a 2U box that combines block and file storage in the same system. IT can use a mix of SSD, SAS or near-line SAS drives. It automatically migrates files to the appropriate drive based on policy. Maximum capacity is 36TB when using 12 3TB near-line SAS disk drives.

“The V7000 is very software-rich in its capability for virtualizing not only itself, but storage from a lot of other vendors as well, Instead of having to throw out a lot of the legacy storage they have, the V7000 virtualizes the older storage so they can get greater value out of their assets.” said Balog.

NAS and SAN

For large-scale NAS deployments, IBM released Scale Out NAS (SONAS) to deliver petascale cloud storage.

“Unstructured and semi-structured data is the fastest growing part of the storage market, and we found clients were looking at these massive NAS filer systems built up over the years, They would have dozens or hundreds of filer farms, each with little islands of unstructured data.” said Balog.

SONAS allows them to bring up to 21PB of unstructured data into a single namespace, and research is ongoing to raise the capacity to 100PB.

The IBM SAN Volume Controller (SVC) software and the SVC Entry Edition appliance bring SAN efficiency and reliability to enterprises and SMBs. To simplify deployment, the SVC software comes preinstalled on SVC Storage Engines, which are based System x server technology. The Storage Engines are always deployed in redundant pairs to ensure availability. The SVC also uses a new graphical user interface similar to that used by the XIV Storage System.

Tips for Buying IBM Storage Read More »

DriveSavers Data File Recoveries for Apple Users Tops Six Billion

DriveSavers Data Recovery provides the fastest, most reliable and only certified secure data recovery service in the industry. As the only data recovery company to post proof of annual, company-wide SAS 70 Type II Audit Reports and its HIPAA data security compliance, DriveSavers services meet the security protocols for financial, government, corporate and healthcare industries. DriveSavers also adheres to US Government security protocols, the Gramm-Leach-Bliley Act Data Security Rule (GLBA), the Data-At-Rest mandate (DAR) and the Sarbanes-Oxley Act (SOX). Known for its technologically advanced Certified ISO 5 (Class 100) cleanroom, the company is authorized to open storage devices by all major storage device manufacturers without voiding the warranty. DriveSavers engineers are trained and certified in all leading encryption and forensics technologies. Satisfied customers include: Bank of America, Google, Lucasfilm, NASA, Harvard University, St. Jude Children’s Research Hospital, U.S. Army and Sandia National Laboratories.

DriveSavers,DriveSavers Data Recovery

DriveSavers announced that the company has recovered over six billion data files for Apple users since the company’s inception over twenty-five years ago. Six billion data files are equivalent to the amount of data stored in the Library of Congress, one of the largest databases in the world. Videos, digital photos, financial files, personal documents, address book contacts, calendar entries and music are examples of the types of data that is recovered.

Scott Gaidano, president of DriveSavers, lost business critical files on a Mac floppy disk many years ago. Disappointed and frustrated, Gaidano along with Jay Hagan, decided to attempt to recover the data which lead to the two gentlemen starting their own data recovery business. Today, DriveSavers recovers data from iPads, iPhones, iPods and essentially any storage device (Apple or non-Apple related) that has suffered common or catastrophic data loss. DriveSavers has pioneered the data recovery industry by demonstrating best practices, methods and security standards for recovering data safely and securely.

As innovative Apple products continue to emerge and become immersed in the mainstream of businesses and consumers, DriveSavers anticipates that more critical data will be stored on these amazing devices…and lost – due to user error, physical damage, mismanagement and software or hardware failure. And, we anticipate that recovering the data will become progressively complex, especially with the use of SSD technology in many of these products such as the iPad and iPhone. DriveSavers has more expertise, technology and capabilities to successfully recover data from Flash memory-based solid-state devices than any other data recovery company.

This year at Macworld/iWorld, DriveSavers will display a special enhanced version of its world-famous museum of “disk-asters” featuring a laptop that was crushed by the earthquake in Haiti. In addition, DriveSavers in-house authority on SSD data recovery, Chris Bross, will give hands-on demonstrations at DriveSavers booth (#436) on the complexity of data recovery for SSDs and other storage devices, and will share his fascinating experiences with data lost and data found.

DriveSavers Data File Recoveries for Apple Users Tops Six Billion Read More »

IDrive Offers Universal Cloud Backup For Unlimited Number Of Devices

IDrive announced today that they will be offering a single plan with which subscribers can back up an unlimited number of PCs, Macs, Smartphones and Tablets.

idrive-logoThe plans are branched into two categories: home/personal users and business users. For the personal users, available plans ar $4.95/month for 150 GBs and $14.95/month for 500 GBs. Additionally, personal users may subscribe and receive their first 5GB for free. Under the business plan, subscribers can get anywhere from 50 GBs of storage for $9.95/month to 1 TB for $79.95/month.

“We’re excited about the latest updates to IDrive, with a single account new customers can back up as many computers and mobile devices as they want and then view their files from any of those connected devices or on our website. Plus, the mobile app can now back up contacts, photos and videos and make them available online as well.” said Raghu Kulkarni, founder and CEO of Pro Softnet Corp.

“Many backup services offer ‘unlimited’ storage space for a single computer at a flat rate, like $50 per year per computer – it sounds like a good deal at first, but back up 100 GBs from that one computer and you pay $50/year, back up just 50 GBs and you still have to pay $50/year: that’s where they get you, not only that, ‘unlimited’ storage plans almost always have very limited file retention, meaning they automatically remove data from your backup after you delete the files from your computer, usually just 30 days later. The question is, ‘What use is a backup that doesn’t contain files you accidentally deleted, say, six months ago?’ On the other hand, IDrive allows people to actually use all of the online storage they are paying for.” said Stephen Gold, Business Development Manager.

For those unfamiliar with IDrive’s stats, a quick run-down of their features:

  • Get full access to files from any PC, Mac, iOS or Android device,
  • Share any file/folder using an email address – easily swap large files with others,
  • Intelligent incremental backups/restores over a secure connection,
  • Available private key encryption for maximum security,
  • “True Archive” storage – data is never automatically deleted and the last 30 versions of each file are held without counting against GBs stored,
  • Continuous Data Protection for real-time backup of commonly used files,
  • No file size or type limitations – no bandwidth throttling,
  • Rapid Serve Restore – large restores can be physically shipped for quick disaster recovery,
  • IDrive builds its own hardware and software; the speed and performance can rarely be matched,
  • Live phone and 24-hour chat support.

IDrive also has a mobile app available so users can access their account and share files when they’re away from their computers. Users can back up contact information, photos and videos over a Wi-Fi or 3G connection to the IDrive cloud from iPhone, iPad and iPod touch devices running iOS 4.0 or later as well as Google Android devices running 1.6 or later. The information is then made available via other connected computers and mobile devices as well as on the IDrive website.

About IDrive:

IDrive Online Backup is an industry-leading solution for online backup for PCs, Macs and Smart Phones including iPhones, Blackberries and Android based Phones.

Related post: Top 5 Online Backup Services

IDrive Offers Universal Cloud Backup For Unlimited Number Of Devices Read More »

Web Host SherWeb Launches SkyNox Online Backup

sherweb-online-backupWeb hosting provider SherWeb released SkyNox, a new cloud data backup solution tailored to small businesses.

As a Microsoft Gold Certified partner and leader in the cloud-computing business, SherWeb offers you top-quality hosted services such as Microsoft Exchange, OCS, SharePoint and CRM, and also access to our archiving and compliance system as well as Virtual Private Servers (VPS) and Web hosting solution.

SkyNox ensures business continuity in the event of disasters and allows quick file and data recovery for both workstations and servers. Featuring 448-bit Blowfish encryption transferred via a proprietary protocol, all data is safely stored in SherWeb’s Tier 3+ data center.

1. Workstation Backup

  • $0.49* /Gb
  • * $0.25 for a limited time
  • Windows & Mac
  • Continuous data protection
  • $3.95/month per license

2. Server Backup

  • $0.49 /Gb
  • Windows
  • MS SQL & MS Exchange
  • Advanced scheduling
  • $5.95/month per license

SkyNox online backup also lets you access and restore your data in three flexible ways:

  • via local client application
  • via web console for remote access and sharing
  • via express shipment of your recovered data on a hard drive

“We are thrilled to add online backup to our cloud portfolio. The launch of SkyNox further expands our decade-long commitment to providing innovative high-end Web hosting solutions to SMBs.” said Peter Cassar, CEO and co-founder of SherWeb.

SkyNox comes with 24/7 expert technical support with flexible storage plans and three recovery options.

Web Host SherWeb Launches SkyNox Online Backup Read More »

Scroll to Top