Reading, 15 September 2021 – Redstor and XTECH announce a strategic partnership to protect customers’ traditional infrastructure as well as cloud and SaaS data from a single app.Continue reading
Please give us a few moments whilst we get your account ready.
Cloud platforms have rapidly become adopted across all industries and by organisations of all sizes. However, there is a misconception held by some IT professionals that data created and stored via cloud services do not need to be backed up – in a technical climate with so many threats, this is a dangerous assumption.
Organisations of all sizes rely on Office 365 to get work done on an increasingly 24/7 basis, the days of hosting exchange servers are long gone, and with them have gone user’s acceptance of any downtime. With all this data in the cloud organisations face a whole new set of concerns that need careful consideration when it comes to data management and protection.
What happens when users accidentally delete or overwrite files?
If an employee leaves the company, will it be possible to prevent their files leaving with them?
How can organisations be protected from app outages, misconfigured workflows or ransomware attacks?
When data is deleted or corrupted, businesses face three major problems:
As with any database or data source within an organisation, active directories should be protected and backed up; this is no different with a cloud based active directory. With such important information stored in these systems, a cloud to cloud backup will assist with compliance and protect against accidental or malicious deletion of data.
Redstor data management gives flexible retention periods from a standard 60-day period to seven-years or indefinite retention and will recover directly back to Office 365 adding an additional layer of security and giving retention that may not be easily possible directly from cloud services.
InstantDataTM, Redstor’s unique streaming technology offers access to all data without being reliant on any Office 365 credentials – even after a user has been removed from Active Directory. This ensures that in the event of a disaster, an outage or a malicious or accidental deletion that data can be restored on demand.
A diverse backup strategy is vital if an organisation is to avoid being wholly dependent on a single cloud vendor such as Microsoft or Amazon. Being solely reliant on a single vendor brings potential threats and challenges with outages and when it comes to support.
The availability of Support for recovering lost data can be time consuming, even more so if it is not possible to directly speak to someone via the phone or email, that is if email services haven’t been affected as part of an outage.
With Redstor, organisations retain control of their data and are able to act immediately in the event of an issue. In addition, Redstor’s world-class support teams are available 24/7/365 to assist and are only a phone call away.
Companies nowadays require a separation of roles as a security standard. This is because Office 365 administrators could potentially assign themselves full access to search and export from Exchange mailboxes, SharePoint folders, and OneDrive locations and delete a file.
Without third-party backup, that file, depending on the retention policy, may be irretrievable.
This is one of the main reasons why many organisations, such as the Brandon Trust, opt to use third-party backup in tandem with Office 365.
Redstor’s data management solution includes role-based access control and auditing, which helps companies to comply with current and upcoming data protection laws, while also allowing a different department or administrator to hold the rights for restores.
In addition, many clients insist on a recoverable offline copy of their Office 365 data. This is truly the only way to protect from data corruption as Microsoft explicitly states that point-in-time restore of data is not in the scope of Exchange service.
The recent ransomware attack on Kaseya, a cloud-based IT and security management provider services company that supplies tech-management tools to customers worldwide, has the potential to be the most serious cyber-criminal incident this year.Continue reading