Blogs

Dec 2016
6

New Study Reveals Insights into Global Data Recovery Practices

 
Report thumbnail

How much data does your organization recover annually? It’s probably less than you think. The new Data Protection Trends: Validating Recovery report conducted by Asigra debunks the notion that organizations recover 100 per cent of their data – even when given the option to restore larger amounts. In a study conducted by Enterprise Strategy Group in 2013 with over 500 financial and IT decision makers, 52 per cent of respondents surveyed said that a recovery based pricing model would be more fair than a capacity based pricing model. So then, why do most organizations pay for 100 per cent recovery when in reality they’re recovering much less?

As enterprises look for better ways to recover their data, reduce downtime and prevent malicious attacks against their data, this report provides valuable insights for Managed Service Providers, IT Professionals and financial decision makers that will help enterprises on their search to find appropriate cloud backup and recovery solutions. Conducted over a 30-month period, the study compiled insights of data recovery practices from over 1,000 organizations in over 134 countries across eight vertical markets. Download the full report (link to look book) and garner insights on:

  • How much data organizations actually recover per year
  • Average size and most common types of dataset recovery across vertical markets
  • Common data type restoration and requests
  • Reasons why there’s been a surge in Data Recovery Drills
  • Asigra’s Recovery License Model®

With the average total cost of data breaches steadily increasing every year (from $3.79 million to $4 million in one year)1, this timely report will allow companies, MSPs and enterprises to not only make smart choices about their data protection and recovery solutions, but to also guide them in their decision on how to appropriately distribute IT budgets to help them with their high-level business strategy.

Download the report today and receive the insights you need to maximize operational efficiency, increase profitability and learn about valuable data recovery services.

1. 2016 Cost of Data Breach Study: Global Analysis conducted by IBM

Download My Copy

Spice IT Email Post
Nov 2016
24

Avoiding Common Remote Asset Data Protection and Recovery “Gotchas”

Posted by Eran Farajun in Cloud Backup
 
Image with appliances

Remote offices, branch offices (ROBO), small offices, and home offices (SOHO) have become ever more dominant characteristics of business organizations. SOHOs have grown rapidly, as more organizations permit their employees to work from home. Government organizations have not been immune to this trend , as they have become more geographically dispersed than ever before. Mobile dispersed work forces frequently means dispersed data assets. These are data assets having tremendous value with potentially dire consequences if lost or compromised. They have to be protected. They have to be easily recoverable in the event of a disaster, outage, malware, theft, or accident. IT professionals will typically say that’s common sense.

Regrettably, Voltaire was correct in his assertion that common sense is not so common. There are two crucial responsibilities here. The first is to protect the applications and their data. The second is more difficult in making both easily recoverable. Data protection and recovery processes for data centers are well known with decades of experience. Professionals utilize that which they know best and therefore apply these data protection and recovery procedures to ROBOs and SOHOs. Applying those processes to ROBO and SOHO is the root of way too frequent “gotchas”. There are several reasons why.

  • IT professionals are numerous and generally experienced in the data center. It is rare indeed to have any trained IT pros in a ROBO. They are a non-factor in SOHOS. In fact ROBO IT tends to be a secondary responsibility of some other position. This means there is a dearth of data protection and recovery knowledge, expertise, as well as experience at both ROBO and SOHO locations.
  • Most of the effort for ROBOs and SOHOs is on protecting not recovering. This is understandable since protection is minimally a daily process whereas recovery is a once in a while process. However, as important as the protection process is, the recovery process is always one of urgency.
  • ROBO and SOHO primary IT compute devices utilized are laptops, tablets, combos, phablets, and smartphones. These are known as mobile “endpoints”. Physical (a.k.a. physical machines or PM), virtual servers (a.k.a. virtual machines or VM), and desktops have become a bit more rare and found primarily in the larger ROBOs. Data protection and recovery for PMs, VMs, and desktop workstations are a definite but well understood problem. But for those mobile endpoint devices it is generally a misguided after-thought. Data center IT too often labors under the false assumption that the vast majority of the organization’s mission critical data resides on its servers. That assumption keeps proving to be a major mistake. Users keep creating valuable organizational data assets on their mobile endpoints that never make it to the data center. Proposals, presentations, spreadsheet analysis, data analytics, market research, software development, and more.
  • Unlike PMs, VMs, and desktops, those mobile endpoints are more vulnerable to being compromised, lost, or stolen. When a mobile end point such as a laptop is lost or stolen so too are the credentials on that laptop. As recent news stories have noted, it is not very difficult to bypass the simple end point security if there is any at all. A lot of mischief can be accomplished in a short period of time (data theft, malware insertion, Trojan horses, Ransomware, etc.) before those credentials can be cut off. The aftermath can take months of extensive IT manually labor-intensive effort to clean up.

The common workarounds to many of these problems mostly come up short or fail out right. They depend too much on ignoring normal human behavior. Here are some of the most pernicious examples:

  • Implement virtual desktop infrastructure (VDI) to the endpoints. In theory this should automatically keep all applications and data in the data center. In practice, not so much. Users often become highly dissatisfied with VDI because of poor response times from high Internet latency, high VPN latency, and VDI resource under provisioning (costly storage, servers, memory, and bandwidth). That dissatisfaction displays itself with local virtualization and utilizing that local image as their primary. Defeats the purpose of VDI.
  • Require users to manually copy their data to data center servers or storage. No matter how stringent the policy, and how diligently enforced, this methodology is simply an unsustainable “no-op”. In other words, it just does not work. And still does nothing in the event of an endpoint theft.
  • Utilize private and or public file sync and share technology to keep all user data available local as well as in the data center or to the data center. This workaround enables data copies in the data center but fails to lock down the data or device credentials in the event of a theft.

What then are the best practices to protect and recover data in ROBOs and SOHOs? It starts with recognizing that ROBO requirements are different from the data center. It requires a thorough data threat analysis. But most importantly, there should be a reliable, repeatable, simple process for recoveries with minimal to no local expertise in the ROBO.

Beginning with the remote servers, it is essential to start with the essentials. Determine the required recovery point objectives (RPO) or how much data loss can be tolerated for each PM and VM workload. Then determine the recovery time objectives (RTO) or how long it will take to recover and be up and running in production again for each PM and VM workload. RPOs and RTOs often determine the methodology required to both protect and recover data. For example, if some of the VMs require a RPO and RTO at zero or near zero then some form of VM replication will likely be required. Low RTOs require local oriented recoveries, VM mounting, or VM turn-up. The key to ROBO recoveries is simplicity. One-pass recoveries. No expertise required at the ROBO. Or all recoveries managed by the data center or a managed service provider.

The bigger protection and recovery problems are the endpoints that have become the staple of ROBOs and SOHOs. As previously discussed, endpoints are mobile. Endpoint protection and recoveries have to be both self-contained as well as centralized to an internal data center, third party data center typically managed by a managed service provider (MDP). Those endpoints typically require relatively low RPOs and RTOs. That requires relatively frequent automated backups of changed blocks, which utilize minimum endpoint resources to the internal drive and a copy of those backups to the data center or cloud based MSP. The internal drive for fast local recoveries of files and centrally for bigger recoveries when a disaster occurs such as a Ransomware attack.

But protection for mobile endpoints has to go further. It has to protect against lost or stolen endpoints. That requires geo-location of the endpoints and remote wipe. The geo-locate is to find lost units. The remote wipe is to remove any or all of the valuable data to prevent it from being used, leveraged for other nefarious purposes, or sold from stolen or unrecoverable units. That issue is specific to laptops and combo units. It is less so for tablets and smartphones, which tend to have those capabilities built-in.

Asigra delivers complete ROBO and SOHO data protection and recoveries required today via its software and hundreds of managed service providers.; For more information go to: http://www.asigra.com/enterprise or check out how we help the makers of Absolut Vodka (Pernod Ricard case study) protect their data across 42 territories with a centralized data protection strategy. That strategy empowers them to perform recoveries of individual files, databases, and emails easily, quickly, and reliably.

Spice IT Email Post
Nov 2016
22

What’s the Best Way for Your Organization to Prevent Ransomware Attacks?

 
Brent Reichow headshot

This is part of a series of interviews with Asigra Partners. In this post we’re talking with Brent Reichow, Principal at BlueShift Data Protection about misconceptions with IaaS and SaaS and data protection, trends in the Asian-Pacific market related to backup and recovery, his experiences with ransomware and what organizations can do to prevent attacks.

VM: IaaS Systems like MS Azure and AWS seem to be proliferating these days? What should enterprises/companies be aware of when using these tools?

BR: Services like Azure and AWS will continuously grow their cloud computing services and solutions to keep up with the demands of the marketplace. Something organizations need to keep in mind is that these are not backup providers and offer little to no solutions when it comes to backing up and recovering data.

VM: With so many companies moving to the cloud and SaaS platforms, what would you say are the biggest misconceptions with data protection and SaaS offerings?

BR: Whether you make the choice to use AWS, Google Apps, Salesforce.com remember that none of these services offer a robust backup, recovery or protection plan for user data. Remember, you’ve outsourced a service, not a data management tool, so it’s important to know that your information will not be protected when considering these services.

VM: What are some trends you’re noticing in the industry now?

BR: There are a couple of trends that we are tracking and seeing more traction with recently:

  1. Virtualization: Most companies are moving infrastructure to the cloud. Once organizations move to the cloud, keep in mind that you’ll require other services.
  2. The Rise of Data Centres:  Data Centres became popular during the early 2000’s because companies needed fast internet connections and a fluid operation to manage operational systems, ensuring that systems were efficient. At Blueshift, we’re currently extending our partnerships with data centres, providing them with backup and disaster recovery services to ensure that their clients maintain operational excellence and efficiency.
  3. Increasing Demand for Trusted IT Advisors:  I’ve noticed that our customers want us to do more than just manage their data, we’re now almost like consultants who work with them to not only provide services, but to also provide insights like a Trusted IT Advisor. We help them with their policy creation to ensure if an attack did hit, their onsite IT staff is more proactive than reactive.

VM: What is the one piece of advice you can give to companies to prevent/safeguard ransomware from affecting their data?

BR: Users/employees are the weakest chain in the link – this is typically where most of the mistakes will happen (i.e. clicking on a link in an email). We advise managers to:

  1. Train their employees by reminding/informing them of what ransomware is. Make sure they understand the ramifications of ransomware and how it can be avoided.
  2. Set up some sort of policy or guidelines around dealing with ransomware attacks. For example there should be a set of steps/reporting structure in place if computers were to be hit with ransomware.

VM: There was an experience which you had with one of your clients in Tokyo where they were hit by ransomware. How were you able to help them recover the data…can you tell us about the recovery process and what you did?

BR: There have been three instances where our clients have been hit by ransomware. This specific client was in the healthcare industry, namely in the medical device manufacturing field. On October 6, 2016, we received the call that they were not able to access files in the network. We were able to decipher that the virus was Zepto, because all affected files were renamed with the .zepto extension. We were also able to pinpoint the encryption to a specific laptop within the network where a user opened an email attachment which affected our client’s D: drive…over 300 people and over 20,000 files (approximately 20 per cent of total data). We were able to help to recover the data using our data protection solution powered by Asigra to restore the files that were affected back to their original location and we also disconnected the host workstation so the virus didn’t spread to any more machines. Although the recovery time was fairly quick, the system was down for a few hours because our client wanted us fully educate their IT staff about the ramifications of ransomware and help them implement a new policy on how ransomware can be avoided.

If you would like to read the full investigation, click here to read or if you would like to see a video on how ransomware can encrypt your data: click here.

Spice IT Email Post
Nov 2016
14

What’s New in the Data Recovery and Protection Market

 

Join Host - Alan Hart, Abdul Altamimi – Founder and Chief Technology Officer at RestorePoint and Gerson Guevara – Senior Lead Solution Engineer at Asigra to learn new and emerging trends within the data protection and security industry and how these new trends affect your business.

Click here to listen to the full podcast.

What’s new in the area of data protection?
  • Most companies are moving data towards cloud SaaS based applications (i.e. Office 365, Salesforce.com, and Google Apps).
  • Cloud Based Infrastructure Services (IaaS) like MS Azure and Amazon Web Services are proliferating rapidly in the marketplace.
What are some of the challenges with these new platforms?

SaaS (i.e. Office365, Google Apps, Salesforce.com): What most organizations don’t know that these cloud based applications do not back themselves up. This makes recovering data costly, as it will require several SaaS administrators to recover lost files.

IaaS (i.e. MS Azure and AWS): While these services have totally changed the IT landscape, Gerson Guevara from Asigra provides some of the ongoing challenges with these two cloud based infrastructure services:

  • lack of productivity and efficiency
  • lack of data management tools
  • lack of scheduling capabilities
  • very time consuming for analysts as there is a lack of automation
  • requires extensive scripts written in order to perform  basic functions
  • lack of reporting functionality
What should organizations know about these new solutions and services?
  • Learning these new systems and services will take time and money. However, in the midst of the learning curve, keep data protection and recovery a priority.
  • Because SaaS and IaaS is dominant in the industry remember that all corporate data needs to be backed up…regardless of the device or where it’s located.
What should organizations do when investing in these new/emerging technologies (either SaaS or cloud based infrastructure services?)
  • To ensure that data protection remains a priority and meets the ever-changing compliance requirements and marketplace demands, Administrators, Systems and IT Analysts should choose a comprehensive data protection solution that is flexible, secure, centralized and manageable. As most SaaS solutions do not include a back-up or recovery function and can cost to the tune of $10,000 (with no service level agreement) to restore data, it’s best to secure a data protection solution in conjunction with investing in a SaaS.
  • Do not invest in archaic services of data protection. The best place to protect all cloud based services are to another cloud.

Listen to the full podcast

Spice IT Email Post
Nov 2016
8

How to Select the Best Data Protection and Recovery Solution For Your Business

 
Case study thumbnail

The needs of businesses are ever-changing with the emergence of cloud-based technology. With more employees working globally and remotely, companies now require greater network availability, stronger security and data protection measures to ensure businesses run efficiently. To mitigate costs, most organizations are now relying on cloud technology (i.e. Office 365) to offer a variety of differentiated business solutions on a global scale. This is one of the primary reasons why security and data protection are of utmost importance. All companies are always looking to keep data safe, secure and private in the virtual world.

According to a report recently released by Ovum TMT Intelligence (the world’s leading provider of business intelligence), the findings indicate that Asigra is a strong contender amongst industry leaders (i.e. Actifio, CommVault, Dell Enterprise Products, IBM and Veeam) for offering a cost-effective and one of the best data recovery and protection solutions for enterprises worldwide.

The report measured 12 industry leaders and rated on the following categories (and sub-categories):

  • Technology Features
    • Operational Management, Data Management, Platforms, Security, Backup and Recovery Capabilities, Deployment and Total Cost of Ownership (TCO), Performance and Scalability, Data Recovery and Replication as well as Reporting and Integration
  • Execution
    • Maturity, Interoperability, Innovation, Deployment, Scalability and Enterprise Fit
  • Market Impact
    • Revenue, Revenue Growth, Global Reach, Size Band and Vertical

How did Asigra perform amongst the competition?

  • On average, industry leaders performed well (with an average of 7/10) in most main categories and subcategories.
  • Asigra demonstrated a consistent scoring record against market leaders (average of 7/10) with highest rankings in the execution category.
  • In the technology category, the report indicates that Asigra is a leader in this area, specifically in the categories of Security, Backup and Recovery Capabilities, Deployment and TCO.
  • Asigra fares well amongst the competition for execution and was categorized as a leader for being interoperable and an innovative solution for enterprises.

Why choose Asigra as your data recovery solution?

  • Asigra is one of the very few organizations that delivers on the promise of data recovery to the original device – a large enhancement for security protection.
  • New licensing models recently developed show the percentage of how much data is actually recovered per year, which adds better value as a solution as opposed to solutions that simply measure what is protected.
  • Asigra is one of the very few solution providers that manage and also protect containers and micro-service based applications.

Interested in learning more? Download the full report from Ovum’s website or contact our sales team to schedule a product demo of our award-winning solutions.

Spice IT Email Post
Nov 2016
1

Asigra Expands Leadership Team with Executive Appointments

 

As the maker of award-winning enterprise cloud backup software that provides global organizations with secure, reliable, manageable and affordable data protection we have expanded our leadership team to better serve our global customers. Our focus on fulfilling the needs of our customers internationally, continuing to deliver high-quality, innovative products to the market, supporting expansion into Enterprise market segments, and accelerating growth, underscores the recent appointment of four industry veterans:

  • Mike Andreola, Vice President, Global Sales is focused on expanding the Asigra Global Partner ecosystem and driving forward new business opportunities. He brings more than 25 years of experience leading sales organizations in the telecommunications industry, Enterprise, Carrier and Channel Partner markets. Prior to joining Asigra, Mike was the Vice President of Enterprise Sales at Atria Networks where he was responsible for the acquisition of new customers and growing the company revenue.
  • Al Olivier, Vice President, Engineering oversees the engineering, quality assurance, IT, UX design and product management teams responsible for all product development and operational initiatives in support of strengthening our enterprise data protection solution. Al has extensive experience in leading software development, quality assurance, IT and program operations roles with a passion in driving and shaping intelligent enterprise data solutions. Prior to joining Asigra, Al was the VP IT Operations at SHOP.CA where he led a high performing team of IT professionals to drive growth at one of Canada’s largest e-commerce marketplaces.
  • Andrew Bacon, Director, Global Customer Care is responsible for leading the Global Customer Care team, including the day to day operations of technical support, professional services and product training programs. He leads a team of proficient technical specialists who are focused on fostering customer satisfaction and advocacy through the first-rate delivery of high value support and services. With more than 15 years dedicated to leading technical support and services teams, Andrew is an accomplished leader in the areas of customer care and customer experience. Prior to joining Asigra, Andrew held several management and professional roles at VMware and IBM.
  • Vince Paladino, Vice President, People & Culture is responsible for talent management and implementing employee engagement programs that support the company’s growth and dedication to the data protection marketplace. As a senior HR leader with a background in information technology, financial services and telecommunications, Vince has a keen ability to build and maintain solid business partnerships, and has made HR a valuable resource and contributor to the organization's success. Prior to joining Asigra Vince held several HR management and leadership roles at State Farm, Bell Canada and Quindell.

The team is focused on continuing the great work already underway to accelerate our global growth plans through strong product, partners and customer solutions.

For more information on the team’s background visit www.asigra.com/aboutus/leadership or for details on our award-winning data protection solution, go to www.asigra.com/enterprise. Have questions? Contact us at customerservice@asigra.com or 416-736-8111 ext. 1453.

Spice IT Email Post
Oct 2016
30

Case Study: Faster time to revenue with easy to deploy Asigra Converged Data Protection Appliance for Managed Service Providers

 
Case study thumbnail

Cloud-based backup and recovery is the #1 cloud service for new revenue growth potential for Managed Services Providers (MSP’s). However, many MSP’s struggling with finding a way to offer this solution to their customers in a simple, quick and cost effective way due to the complex nature of the infrastructure needed for this offering.

With the Asigra Converged Data Protection Appliance for, you don’t need to worry about all of that. The pre-engineered appliance allows you to get to market faster and more cost effectively while being able to recover data from virtually any data source. This simple to deploy solution will ensure that you are meeting your customers most stringent recovery time objectives (RTO’s) and recovery point objectives (RPO’s) while keeping operational costs 40-50% lower than competing solutions. These pre-built, pre-optimized, all-in-one units are easier to manage and require fewer resources than a traditional multi-vendor solution.

With this product, our partners have been able to begin delivering cloud backup and recovery services to their clients within a matter of minutes, freeing up resources to focus on other business initiatives such as finding new business. In fact, one Asigra Partner deployed the appliance at a client site in less than 30 minutes.

Our new case study details how our partners have deployed this “in-a-box” cloud backup appliance to start earning monthly recurring revenue immediately. Read the full case study to find out how three leading North American MSP’s were able to reduce their deployment time and freed up resources by minimizing the amount of infrastructure they manage and the required training time to get their staff up and running.

For a limited time, the first Asigra Appliance purchased includes 1TB of Asigra Cloud Backup software free forever under the Recovery License Model. To speak to an Asigra Recurring Revenue Specialist about how to leverage the Asigra Appliance to start offering cloud backup services and earning monthly recurring revenue, email info@asigra.com or call 1-877-736-9901 or 416-736-8111 ext. 1453.

Download the full case study today

Spice IT Email Post
Oct 2016
10

Mitigating the Human Cost of a Disaster with a Data Protection Plan

Posted by Jackie Liu in Cloud Backup
 
Hurricane Matthew satellite photo

Hurricane Matthew has clearly had a human cost, with hundreds of lives lost and underdeveloped regions bearing the brunt of the casualties. The worst of the carnage was in Haiti where over 1000 people have perished and thousands more have lost their homes and desperately need medical help. Even in the US where authorities have been warning residents from Florida to North Carolina to evacuate for days, at least 33 people have died.

If you wish to contribute to the relief effort, we encourage you to give to a charity in your area.

While first responders are at the front line protecting people, basic infrastructure including transportation and telecommunications networks become all the more critical to their work. As many have learned in this storm, it’s essential to plan for business continuity well before a disaster or you could needlessly put personnel in harm’s way. For organizations with 24/7 operations such as government or utilities, losing access to mission-critical systems for even a brief period of time could add to the human cost of a disaster. Think 911 operations centers, hospitals or municipalities.

If your datacenters are located in a hurricane-prone region, you’ll want your employees to evacuate as soon as possible, not spend time making preparations when it may already be too late. With regular, off-site backup in place, you’ll rest easy knowing your data is protected while your staff can focus on what’s most important, looking after their family’s safety. If you are still relying on a tape backup system, there probably won’t be enough time to move those tapes to a safe location when a hurricane or tornado can affect areas thousands of miles wide.

Equipment can always be replaced, but your most valuable assets — your people and data cannot. It’s a matter of when, not if another deadly storm hits. The frequency of tropical storms are increasing, with potential links to climate change. According to NCAR, the frequency of Atlantic hurricanes have doubled over the last century. With aging infrastructure in many parts of the US and the rest of the world, critical systems such as levees are less able to withstand floodwater than ever.

Your considerations about data protection should extend beyond backup and encompass a full disaster recovery and business continuity plan. It’s a good idea to conduct a full data protection audit to consider appropriate recovery time objectives (RTO) and recovery point objectives (RPO) — i.e. how much downtime and data loss each department of your organization could withstand. For the most sensitive organizations, a warm or hot disaster recovery site that’s geographically removed from your location should be considered.

We understand that not every organization has the internal IT capabilities to undertake this kind of audit. Even if you have significant IT resources in-house, chances are they’re tied up with day-to-day operations and projects like replacing aging systems. That’s why more organizations are turning to disaster recovery as a service (DRaaS) arrangements where a managed service provider will design and implement a disaster recovery plan on your behalf. You have the choice of storing your backup data in a public, hybrid or private cloud, depending on business requirements and privacy and security concerns.

Speaking with an Asigra Recoverability Specialist can clarify your options and match you with a service provider for your region and industry. For a free consultation, please contact us here

Spice IT Email Post
Oct 2016
5

Case Study: A Cost-Effective Path to Cloud Backup Services (and Recurring Revenue)

Posted by Eran Farajun in Cloud Backup
 
Case study thumbnail

Increasing recurring revenue is one of the toughest challenges that MSPs face. With income from project work and break/fix frozen in place or declining, many MSPs turn to cloud-based managed services such as data backup and recovery to boost monthly recurring revenue.

Finding a way to easily deliver these services can be daunting, while researching, assembling, designing and maintaining the infrastructure required to offer cloud-based services can be expensive and time consuming.

What’s an enterprising MSP to do? Read on: Asigra’s new case study illustrates how Asigra Converged Data Protection Appliances for Managed Service Providers deliver cloud backup and recovery software, hardware, and services “in a box” to simplify the deployment and lessen the cost of providing cloud backup services.

We’ve assembled a multi-faceted case study based on interviews with our partners to help MSPs like you better understand the benefit of Asigra Appliances as a simple and cost-effective way to quickly deploy cloud backup services and get to revenue faster. Download this case study to learn how Asigra Appliances can help MSPs minimize the cost of cloud backup infrastructure and services, and start earning revenue quickly, without a large upfront capital investment.

Asigra Converged Data Protection Appliances provides a range of pre-built, all-in-one appliances that come pre-integrated with Asigra Cloud Backup, a comprehensive, multi-tenant data protection solution for all data sources, regardless of platform. Asigra Cloud Backup protects data located in virtual and physical servers, Docker containers, enterprise databases and applications, and endpoint devices such as desktops, laptops, tablets and smartphones. Asigra Cloud Backup also backs up SaaS-based office systems such as Microsoft Office 365, Google Apps, and Salesforce, plus PaaS sources such as Amazon Web Services and Microsoft Azure. Cost-effective, easy-to-deploy Asigra Converged Data Protection Appliances enable MSPs to have their cloud backup and recovery service up and running within an hour.

To speak to an Asigra Recurring Revenue Specialist about how to leverage the Asigra Appliance to start offering cloud backup services and earning monthly recurring revenue, email info@asigra.com or call 1-877-736-9901 or 416-736-8111 ext. 1453.

Spice IT Email Post
Sep 2016
26

Datastring Founders Establish Cloud Backup Company through Asigra Partnership

Posted by Jackie Liu in Cloud Backup
 
Datastring logo

Read the Press Release

Meet the people behind the UK and Ireland’s most exciting, up-and-coming cloud backup provider – Datastring. Jon Thordarson, CEO and Steinthor Kristinsson, CTO are highly experienced IT infrastructure engineers who have protected customer data using Asigra since 2004 at Securstore (later KeepItSafe), an award-winning Asigra Partner.

A couple of years after their former company was acquired, Jon and Steinthor decided to strike it out on their own. They formed Datastring with an eye for the growing market of organizations who need to protect their SaaS and IaaS data.

Datastring needed a robust platform that supported today’s growing diversity of data sources – from traditional to cloud data protection. Asigra was a tried-and-true solution from the founders’ perspective and the logical choice they immediately considered.

Asigra is proud to announce that we have earned Jon and Steinthor’s trust as the platform powering Datastring’s cloud backup services. Their decision to build their business as an Asigra Partner is a huge vote of confidence, from a team who has over 12 years of experience using our solution. They were impressed by how our software has evolved over the years, growing in functionality to cover Office 365, Salesforce, Google Apps, Azure, AWS backup, replication and virtual machine disaster recovery.

We are confident that Datastring will accelerate their growth with Asigra Cloud Backup, given the promising response from their customer base. Joseph Morsi, Lead Infrastructure Engineer at Digiterre noted “The Datastring solution meets all of our business requirements. Their proven industry knowledge, experience and reputation was crucial in our decision.”

Any organization seeking a trusted advisor to assist with Backup-as-a-Service (BaaS) and Disaster-Recovery-as-a-Service (DRaaS) projects should certainly consider contacting Datastring. All of their engineers have hands-on experience as network administrators, preparing them to tackle your most complex data protection requirements.

If you are a MSP who would like to know how the value of an Asigra partnership extends beyond the software, please visit our page about partnering with Asigra.

Spice IT Email Post
Syndicate content
Print this page
Email this page