Eran Farajun's blog

Nov 2016

Avoiding Common Remote Asset Data Protection and Recovery “Gotchas”

Posted by Eran Farajun in Cloud Backup
Image with appliances

Remote offices, branch offices (ROBO), small offices, and home offices (SOHO) have become ever more dominant characteristics of business organizations. SOHOs have grown rapidly, as more organizations permit their employees to work from home. Government organizations have not been immune to this trend , as they have become more geographically dispersed than ever before. Mobile dispersed work forces frequently means dispersed data assets. These are data assets having tremendous value with potentially dire consequences if lost or compromised. They have to be protected. They have to be easily recoverable in the event of a disaster, outage, malware, theft, or accident. IT professionals will typically say that’s common sense.

Regrettably, Voltaire was correct in his assertion that common sense is not so common. There are two crucial responsibilities here. The first is to protect the applications and their data. The second is more difficult in making both easily recoverable. Data protection and recovery processes for data centers are well known with decades of experience. Professionals utilize that which they know best and therefore apply these data protection and recovery procedures to ROBOs and SOHOs. Applying those processes to ROBO and SOHO is the root of way too frequent “gotchas”. There are several reasons why.

  • IT professionals are numerous and generally experienced in the data center. It is rare indeed to have any trained IT pros in a ROBO. They are a non-factor in SOHOS. In fact ROBO IT tends to be a secondary responsibility of some other position. This means there is a dearth of data protection and recovery knowledge, expertise, as well as experience at both ROBO and SOHO locations.
  • Most of the effort for ROBOs and SOHOs is on protecting not recovering. This is understandable since protection is minimally a daily process whereas recovery is a once in a while process. However, as important as the protection process is, the recovery process is always one of urgency.
  • ROBO and SOHO primary IT compute devices utilized are laptops, tablets, combos, phablets, and smartphones. These are known as mobile “endpoints”. Physical (a.k.a. physical machines or PM), virtual servers (a.k.a. virtual machines or VM), and desktops have become a bit more rare and found primarily in the larger ROBOs. Data protection and recovery for PMs, VMs, and desktop workstations are a definite but well understood problem. But for those mobile endpoint devices it is generally a misguided after-thought. Data center IT too often labors under the false assumption that the vast majority of the organization’s mission critical data resides on its servers. That assumption keeps proving to be a major mistake. Users keep creating valuable organizational data assets on their mobile endpoints that never make it to the data center. Proposals, presentations, spreadsheet analysis, data analytics, market research, software development, and more.
  • Unlike PMs, VMs, and desktops, those mobile endpoints are more vulnerable to being compromised, lost, or stolen. When a mobile end point such as a laptop is lost or stolen so too are the credentials on that laptop. As recent news stories have noted, it is not very difficult to bypass the simple end point security if there is any at all. A lot of mischief can be accomplished in a short period of time (data theft, malware insertion, Trojan horses, Ransomware, etc.) before those credentials can be cut off. The aftermath can take months of extensive IT manually labor-intensive effort to clean up.

The common workarounds to many of these problems mostly come up short or fail out right. They depend too much on ignoring normal human behavior. Here are some of the most pernicious examples:

  • Implement virtual desktop infrastructure (VDI) to the endpoints. In theory this should automatically keep all applications and data in the data center. In practice, not so much. Users often become highly dissatisfied with VDI because of poor response times from high Internet latency, high VPN latency, and VDI resource under provisioning (costly storage, servers, memory, and bandwidth). That dissatisfaction displays itself with local virtualization and utilizing that local image as their primary. Defeats the purpose of VDI.
  • Require users to manually copy their data to data center servers or storage. No matter how stringent the policy, and how diligently enforced, this methodology is simply an unsustainable “no-op”. In other words, it just does not work. And still does nothing in the event of an endpoint theft.
  • Utilize private and or public file sync and share technology to keep all user data available local as well as in the data center or to the data center. This workaround enables data copies in the data center but fails to lock down the data or device credentials in the event of a theft.

What then are the best practices to protect and recover data in ROBOs and SOHOs? It starts with recognizing that ROBO requirements are different from the data center. It requires a thorough data threat analysis. But most importantly, there should be a reliable, repeatable, simple process for recoveries with minimal to no local expertise in the ROBO.

Beginning with the remote servers, it is essential to start with the essentials. Determine the required recovery point objectives (RPO) or how much data loss can be tolerated for each PM and VM workload. Then determine the recovery time objectives (RTO) or how long it will take to recover and be up and running in production again for each PM and VM workload. RPOs and RTOs often determine the methodology required to both protect and recover data. For example, if some of the VMs require a RPO and RTO at zero or near zero then some form of VM replication will likely be required. Low RTOs require local oriented recoveries, VM mounting, or VM turn-up. The key to ROBO recoveries is simplicity. One-pass recoveries. No expertise required at the ROBO. Or all recoveries managed by the data center or a managed service provider.

The bigger protection and recovery problems are the endpoints that have become the staple of ROBOs and SOHOs. As previously discussed, endpoints are mobile. Endpoint protection and recoveries have to be both self-contained as well as centralized to an internal data center, third party data center typically managed by a managed service provider (MDP). Those endpoints typically require relatively low RPOs and RTOs. That requires relatively frequent automated backups of changed blocks, which utilize minimum endpoint resources to the internal drive and a copy of those backups to the data center or cloud based MSP. The internal drive for fast local recoveries of files and centrally for bigger recoveries when a disaster occurs such as a Ransomware attack.

But protection for mobile endpoints has to go further. It has to protect against lost or stolen endpoints. That requires geo-location of the endpoints and remote wipe. The geo-locate is to find lost units. The remote wipe is to remove any or all of the valuable data to prevent it from being used, leveraged for other nefarious purposes, or sold from stolen or unrecoverable units. That issue is specific to laptops and combo units. It is less so for tablets and smartphones, which tend to have those capabilities built-in.

Asigra delivers complete ROBO and SOHO data protection and recoveries required today via its software and hundreds of managed service providers.; For more information go to: or check out how we help the makers of Absolut Vodka (Pernod Ricard case study) protect their data across 42 territories with a centralized data protection strategy. That strategy empowers them to perform recoveries of individual files, databases, and emails easily, quickly, and reliably.

Spice IT Email Post
Oct 2016

Case Study: A Cost-Effective Path to Cloud Backup Services (and Recurring Revenue)

Posted by Eran Farajun in Cloud Backup
Case study thumbnail

Increasing recurring revenue is one of the toughest challenges that MSPs face. With income from project work and break/fix frozen in place or declining, many MSPs turn to cloud-based managed services such as data backup and recovery to boost monthly recurring revenue.

Finding a way to easily deliver these services can be daunting, while researching, assembling, designing and maintaining the infrastructure required to offer cloud-based services can be expensive and time consuming.

What’s an enterprising MSP to do? Read on: Asigra’s new case study illustrates how Asigra Converged Data Protection Appliances for Managed Service Providers deliver cloud backup and recovery software, hardware, and services “in a box” to simplify the deployment and lessen the cost of providing cloud backup services.

We’ve assembled a multi-faceted case study based on interviews with our partners to help MSPs like you better understand the benefit of Asigra Appliances as a simple and cost-effective way to quickly deploy cloud backup services and get to revenue faster. Download this case study to learn how Asigra Appliances can help MSPs minimize the cost of cloud backup infrastructure and services, and start earning revenue quickly, without a large upfront capital investment.

Asigra Converged Data Protection Appliances provides a range of pre-built, all-in-one appliances that come pre-integrated with Asigra Cloud Backup, a comprehensive, multi-tenant data protection solution for all data sources, regardless of platform. Asigra Cloud Backup protects data located in virtual and physical servers, Docker containers, enterprise databases and applications, and endpoint devices such as desktops, laptops, tablets and smartphones. Asigra Cloud Backup also backs up SaaS-based office systems such as Microsoft Office 365, Google Apps, and Salesforce, plus PaaS sources such as Amazon Web Services and Microsoft Azure. Cost-effective, easy-to-deploy Asigra Converged Data Protection Appliances enable MSPs to have their cloud backup and recovery service up and running within an hour.

To speak to an Asigra Recurring Revenue Specialist about how to leverage the Asigra Appliance to start offering cloud backup services and earning monthly recurring revenue, email or call 1-877-736-9901 or 416-736-8111 ext. 1453.

Spice IT Email Post
Jul 2016

MSP Survey Results Show Changing Revenue Landscape: Download the Infographic

Posted by Eran Farajun in Cloud Backup

MSP Survey Results infographic screenshot

Asigra just completed a survey of MSPs, asking them to reveal what they consider to be today’s top revenue opportunities; where they anticipate the greatest revenue growth in coming years; and more.

The results are in! Download our infographic to discover what MSPs have to say about a broad range of topics.

One of the key survey results reveals that cloud backup services have led to increased business revenue opportunities and customer retention for most of the respondents. According to the survey, nearly 90 percent of MSP respondents who offer cloud backup services today are profitable, while 87 percent of those profitable MSPs expect profit margins to grow in 2017. As the cloud backup market continues to expand, even MSPs who are not currently offering cloud backup services have plans to do so within the next 12 months.

These findings confirm what we’ve long believed at Asigra: That cloud backup services offer an excellent opportunity for our partners to increase revenue from both new and existing customers. The survey also indicated which industry segments MSPs expect to fuel new revenue growth in 2017 and beyond: compliance-driven verticals such as healthcare and financials, which face stringent regulatory requirements for data protection and security.

As the first cloud backup software solution to achieve the NIST FIPS 140-2 certification, Asigra Cloud Backup employs state-of-the-art encryption to safeguard customer data at all times, enabling our partners to meet strict compliance requirements and win customers among the most highly regulated industries. The survey results emphasize the importance of comprehensive backup solutions for industry verticals with compliance requirements such as HIPAA and SOX, opening the door for enterprising MSPs who wish to seize opportunities by differentiating themselves in otherwise challenging markets. By positioning secure cloud backup services as a revenue driver, these MSPs can expand their total addressable market and grow monthly recurring revenue.

Want more insights into new revenue opportunities and MSP trends? Download the infographic to discover more results from our recent survey. To learn more about the benefits of becoming an Asigra partner, go to

Spice IT Email Post
Apr 2016

Asigra Cloud Backup™ Version 13.1 Has Arrived. What’s New?

Posted by Eran Farajun in Cloud Backup

We’re excited to let you know that the latest edition of our data protection software, Asigra Cloud Backup™ Version 13.1, has been released. This new version includes many new enhancements to help solution providers secure new business opportunities and enhance competitive position with businesses seeking the industry’s most advanced data protection software solution.

This blog provides a quick overview of the key enhancements, updates and additions in the new release. To schedule a demo of V13.1 or to find out how a partnership with Asigra can help increase your monthly recurring revenue, please contact us at

Hyper-V Data Protection Enhancements

As organizations increasingly embrace virtualization, Asigra Cloud Backup continues to expand its features to enable more comprehensive data protection in virtual machine environments. In Asigra Cloud Backup Version 13.1, we offer a number of data protection enhancements for Microsoft Hyper-V, including incremental backup for virtual machines in both standalone and cluster Hyper-V server configurations, enabling faster backup by retrieving only changed blocks in VMs from one backup session to another.

New Support Matrices

Asigra Cloud Backup Version 13.1 also features a number of new support matrix additions and updates including VMware 6.0, Windows 10, backup and data restore on Oracle 12c, backup for Oracle Database on Solaris 11, and bare metal restore for the Windows 2012 R2 Server core. These new capabilities can help solution providers expand their total addressable market by enabling new Backup-as-a-Service offerings for new data sources while meeting existing customer reqirements.

Support for Oracle Linux

Version 13.1 supports Oracle Linux as an installation platform for DS-System, Backup Lifecycle Management (BLM) Archiver, and Remote Virtual Disaster Recovery (RVDR).

Configurable Geo-location APIs for Flexibility in Endpoint Data Protection

A key security feature for endpoint data protection is the ability to geo-locate and remotely wipe lost or stolen devices. In Asigra Cloud Backup Version 13.1, solution providers now can self-configure the geo-location capabilities within the DS-NOC, Asigra’s web-based management console, for either Google or Skyhook for geo-location APIs and Google Maps or HERE Maps for geographic positioning and location data.

New on-premise Exchange data protection with Exchange Web Services (EWS) Backup Set

For Microsoft Exchange 2013 and higher, Asigra recommends using the new EWS backup set (included in Asigra Cloud Backup Versions 13.1) for item-level backup and recovery with on-premise Exchange deployments.

Contact us for more information

To schedule a demo of Asigra Cloud Backup Version 13.1, please contact us today at 1-877-736-9901 ext. 1453 or email

For existing Asigra partners, please download the V13.1 Release Notes from the Technical Support Portal or the Hybrid Partner Portal. For questions, please contact your dedicated Partner Success Manager or email

Spice IT Email Post
Mar 2016

No More Crossed Fingers: Five Questions Ensure the Optimal Data Protection Approach

Posted by Eran Farajun in Cloud Backup

Cloud Backup There’s often a direct and inverse correlation between the complexity of a company’s computing environment and the effectiveness of its data protection strategies. The result frequently means businesses blindly trust their current data protection solutions to recover all their data in case of disaster. Or put more plainly, they cross their fingers and hope for the best.

This is a subject that I feel strongly about, enough so that I recently wrote an article on this topic for the online publication Data Center Knowledge called Ask These Five Questions for Data Protection Peace of Mind. In it, I call attention to an uncomfortable fact: Many of the new—and often very useful—technologies that we have incorporated into data centers for greater flexibility, scalability, and ease of use, have made data protection much more challenging. If businesses are counting on legacy data protection strategies to fully recover data from their increasingly complex computing environments, then they are in for a surprise when a data loss event strikes.

What technologies and strategies make today’s data centers more difficult to protect than in the past? They include virtual machines and Docker containers; use of cloud-based apps like Office 365 and Google Docs; and an abundance of endpoint devices like tablets, smartphones and laptops that often contain much of a company’s most recent and valuable data. As I discuss in my article, this proliferation of platforms, data types, infrastructures, and operating systems within a single enterprise environment often results in a fragmented data protection strategy that’s costly, difficult to manage, and filled with gaps.

Nobody predicts that computing environments are going to get less complicated, and we all know that the volume, velocity, variety—and importance—of data for business will only grow. Forward-focused businesses require a more comprehensive approach to data protection, one that converges both backup and replication technologies into a single, easily managed solution. With Asigra, businesses can take advantage of a solution that backs up data from any source—from the data center, the cloud, or a smartphone—and stores this data both locally and remotely to achieve business continuity and peace of mind.

Are you confident that your company’s data protection plan (or the data protection plan that you offer your customers) fully protects all data from all sources, with the ability to meet strict RTOs and RPOs?

If you’re not certain, be sure to read my article to find the five questions you need to ask as you begin your search to find a more comprehensive secure data protection solution. What are the top data protection requirements for your business? Let me know – I’d love to hear from you.

Spice IT Email Post
Jan 2016

Asigra Partners with Oracle on ZFS Storage Appliances

Posted by Eran Farajun in Cloud Backup

Oracle and AsigraWith data volume expanding dramatically in both enterprise and SMB sectors (with digital data doubling every two years, according to IDC), companies and organizations are increasingly dependent on digital data to drive their businesses. Providing cost-effective solutions for storing and protecting large capacities of data is becoming ever more critical for the managed service providers (MSPs) who serve these markets.

That’s where Asigra’s recently announced partnership with Oracle comes in. As of today, MSPs who have an existing, or form a new partnership with Asigra can purchase Asigra Cloud Backup software licenses and Oracle® ZFS Storage Appliances directly from Asigra. For MSPs with backup vaults approaching or exceeding 100 terabytes, or those looking to refresh low-performing storage hardware, combining an Oracle appliance with Asigra Cloud Backup provides an exceptionally high performance storage and data protection system while delivering lower operational and capital costs when compared to traditional solutions.

Oracle ZFS Storage Appliances are hybrid NAS storage systems that feature dynamic caching between DRAM, Flash, and disk drives, providing optimal storage for enterprise cloud and virtualized environments, where high efficiency, extreme performance and scalability are required. In combination with Asigra Cloud Backup, the appliances can be used to offer secure, reliable, and cost-effective data protection that’s far superior to build-your-own solutions.

Learn more about the business benefits of deploying Asigra Cloud Backup with the Oracle ZFS Storage Appliances powered by Asigra Cloud Backup.

Working with Oracle to lead the data protection market

It’s exciting for us at Asigra to work with Oracle to offer the powerful ZFS storage appliances along with our award-winning cloud backup software to service providers seeking high performance environments and greater productivity to meet growing customer demands for faster recovery times. Oracle does not offer its own backup solution, but by incorporating our backup and recovery software with the Oracle appliance, Asigra’s partners can now stand up an engineered solution that delivers a highly scalable storage infrastructure along with NIST FIPS 140-2 certified data encryption, comprehensive data protection for all data sources regardless of platform (including virtual and physical servers, containers, desktops, laptops, smartphones and SaaS-based applications), within a single agentless, multi-tenant platform.

One of our partners had the opportunity to deploy the Oracle ZFS Appliance along with our cloud backup software within their environment as a proof-of-concept trial. This partner found that running Asigra Cloud Backup on the Oracle ZFS Storage Appliance ZS3-2 delivered 8x improvement in performance compared to his previous hardware platform. Our partner also achieved five 9s uptime and scaled up to one petabyte of storage with a single ZS3-2 system, while cutting overall storage costs by more than 30 percent.

The Oracle ZFS Storage Appliance is available in two models:

  • Oracle ZFS Storage Appliance ZS3-2, a midrange enterprise multiprotocol storage system ideal for use in performance-intensive workloads.
  • Oracle ZFS Storage Appliance ZS4-4, a high-end enterprise multiprotocol storage system for workloads demanding extreme performance and scalability.

The Oracle ZFS Storage Appliances along with Asigra Cloud Backup software licenses are exclusively available to Asigra partners at special pricing. For more information or to request a demo, please contact an Asigra Recurring Revenue Specialist, visit our website, or contact Asigra at or 416-736-8111 ext. 1453.

Spice IT Email Post
Jan 2015

Five Backup Industry Predictions and Their Impact on Data Protection

Posted by Eran Farajun in Cloud Backup

Enterprise IT is evolving at a rapid pace with new platforms to address emerging business demands. The integration of mobileCloud devices, cloud adoption by business, expansion of data repositories and a general trend toward centralization is changing the way IT is consumed and managed. Backup and recovery is directly influenced by these trends. As backup targets and platforms multiply and costs skyrocket from the time, human capital and costs required, backup vendors are responding. This article will review anticipated changes in IT that are directly impacting data backup technologies, processes and costs. With this foresight is the promise that while a growing number of challenges are negatively affecting organizations, technologies and solutions are available now able to completely mitigate their impact.

Five Backup Industry Predictions for 2015

  1. Cloud-to-Cloud backup will increase in adoption as organizations transition to SaaS-based applications
  2. Recovery Time Objectives (RTOs) shorten as new technologies become available to improve recovery time in any data loss situation
  3. Enterprise backup volumes increase as greater number of devices and data types are incorporated into backup sets
  4. Increased backup technology consolidation as solutions are called on to do more with less complexity and cost
  5. Pricing paradigms continue to evolve to be fair and focus on value

While there are a number of mainstream technology trends impacting the backup space, those that change where data is stored, its volume and location are the most relevant with respect to data protection. The first of these is business adoption of SaaS or cloud-based applications, such as, Google Apps and Office 365. According to Gartner, SaaS is cannibalizing on-premise applications at a growing rate1. Perceived lower Total Cost of Ownership (TCO), faster and easier deployment and reduced capital expense rank among the top drivers for SaaS adoption says the analyst firm. Microsoft sales of Office 365 support this assertion with more 1.5 million new MS Office 365 subscribers in the fourth quarter of 2014, moving the needle toward a 147% cloud application growth rate.

However, when data resides in an external SaaS cloud such as Microsoft Office 365, it is still the responsibility of the organization or the owner of the data to ensure the recovery of that information if lost. For example, if an organization cancels their Office 365 subscription, Microsoft will delete their data after 90 days. However, for regulatory or compliance reasons organizations may need to retain their data for a much longer period of time. Because of this, the need for backup technologies that allow users to regain control of data in cloud-based repositories will increase significantly in 2015, calling for the protection of that data to be integrated within the corporate backup infrastructure. For backup solutions, this will be a necessary step forward in the backup market as cloud applications such as Office 365 are expected to rank among the top in use globally.

The need for SaaS backup in the New Year will be closely followed by the requirement for high performance local and remote data recovery in the event of a site failure. As more backup solutions become more closely aligned with the cloud, solutions will differentiate on multiple levels. Second only to backup reliability will be recovery performance or the ability to retrieve lost data quickly regardless of location. To speed recovery of mission critical data, many organizations will deploy Disaster Recovery-as-a-Service (DRaaS) solutions. DRaaS is the replication and hosting of physical or virtual servers by a third-party service provider to allow for failover in the event of a man-made or natural catastrophe. The recovery can take place at an existing corporate location or at a planned recovery site to expedite business continuity. In 2015, this technology will be viewed as a competitive differentiator and eventually become a mainstream “must-have” to ensure business resilience.

As in the years prior, the next 12 months will see an enormous growth of data. According to a report in 2014 by IDC2 , “the digital universe is doubling in size every two years and will multiply 10-fold between 2013 and 2020 – from 4.4 trillion gigabytes to 44 trillion gigabytes.” IDC’s research indicates that data in the digital universe “touched” by the cloud was 20% in 2013. By 2020, that percentage will double to 40%. This surge in data is exploding for multiple reasons, including the proliferation of wireless technologies, smart products, software defined businesses and the Internet of Things (IoT). In the world of backup, this rise in data will significantly increase the cost to protect it. The volume of data protected and the management of large distributed backup sets is breaking budgets and pulling valuable IT resources away from revenue generating IT projects. In 2015, backup vendors will further address this concern with technologies that take the management of large data sets into consideration.

One of the ways the issue of backup volumes is being addressed is not by the backup technology itself but by the way in which vendors charge to protect it. In most instances, backup pricing is based on the amount of data to be protected, whether tied to the number of machines or volume of data. However, this model is untenable as backup volumes drive pricing beyond available budgets. In 2015, IT administrators will seek alternative pricing models or technology solutions that apply policies to shrink protected data volumes. One such example is recovery-based pricing which flips traditional backup pricing on its head. The approach realigns with the value of backup which is the recovery of data and re-focuses it on the amount of data recovered versus that which is backed up. With this approach users will protect an unlimited amount of data without a pricing penalty and instead pay based on the data that is important enough to recover. The resulting savings of this approach can be as high as 70%.

Finally, the expansion of computing platforms and devices along with data growth has resulted in a cocktail of backup solutions to protect data across physical, virtual, cloud and mobile environments that a few years ago did not exist. Most enterprises today have as many as ten backup solutions to backup data on servers, remote sites, virtual environments, tablets/laptops and the cloud. The resulting mix of backup repositories with differing recovery strategies for each environment and the management resources required to ensure business continuity has been exhaustive for many organizations. The next twelve months will see continued movement toward centralization of this process as new technologies integrate with a broader number of IT environments.

The challenges facing IT professionals can be succinctly narrowed down to increasing IT administrator pain resulting from higher complexity and cost. The backup industry is directly impacted by current and forthcoming trends and vendors have made strides to simplify data protection in ways that have reduced capital and operational expense. While many have made varied attempts, some have made great strides in advancing their solutions. Understanding the forthcoming challenges in data protection and how to ensure the best approach for one’s organization will define industry discussions moving forward. The final responsibility for streamlining backup and refocusing efforts on revenue generating projects is in the hands of IT.

1 Gartner - Market Trends: SaaS’s Varied Levels of Cannibalization to On-Premises Applications

2 IDC, The Digital Universe of Opportunities: Rich Data and the Increasing Value of the Internet of Things, April, 2014

Spice IT Email Post
Jul 2013

Recovery License Model Aligns Pricing with the True Value of Backup – Data Recovery

Posted by Eran Farajun

The growing problem of unfair pricing in the backup and recovery market is unsustainable. It is time for a fair pricing model, one that is aligned with the true business value of backup – data recovery.

Technology has enabled business model revolutions in many markets that are fair to customers, allowing significant savings and better overall value. This has resulted in pricing overhauls in several markets, including the music industry’s shift from albums to per-song pricing; telecom’s move from per-minute to per-second billing, and the auto insurance industry’s Pay-as-You-Drive (PAYD) performance-based pricing as an alternative to monthly premiums based solely on actuarial statistics.

The Asigra Recovery License Model® gives organizations the option of selecting a fair pricing model based on how little they recover. The model is enabled by technology and follows what many experts agree is an evolving movement toward performance-based pricing that aligns with the value derived by the customer. The Recovery License Model separates the cost of backup and recovery. Backup costs are based on capacity and remain constant; recovery costs are based on how much recovery you actually do and although this number is variable there is a limit to how much you can be charged. And nobody recovers 100% of their data – so why should you be paying to recover 100%?

The Recovery License Model pricing gives IT professionals the ability to better control backup and recovery costs, even as organizational data grows rapidly. With this approach, fees are based on a Recovery Performance Score that is calculated over a 12-month period. A waiver is provided for the single largest recovery event in any licensing term and only successful recoveries are included in the calculations. This allows customers who recover less to pay less.

Hear what Databarracks, one of the UK's first providers of managed backup and disaster recovery services, has to say about the business benefits of the Recovery License Model.

Those who adopt the pricing model will realize immediate savings of approximately 40% and long term savings of 60% to 70% as a result of separating backup and recovery license costs and associating price with recovery performance. The Asigra Recovery Tracker™, proprietary analytics tracking software, generates actionable information that helps to improve IT efficiency, enabling performance-based savings and more user control on how they are billed for backup software/services. The model keeps backup and recovery costs under control over time, despite the trend of rapid data growth showing no signs of slowing down.

The Asigra Recovery License Model follows customer demand for pricing that prioritizes data recovery over the backup of data. This is reinforced by recent Enterprise Strategy Group (ESG) research of IT managers and/or staff who influence backup and recovery purchasing decisions. The research revealed a number of findings related to data recovery, including the fact that most of the respondents attributed higher IT costs to rising volumes of data (data capacity). Survey respondents also indicated that they anticipate an increase in backup and recovery costs over the next five years as these volumes grow.

For more information on how you can effectively control and lower your backup and recovery software costs as data volumes continue to grow, download your complimentary copy of “The Costs of Rapid Data Growth”.

Do you think it is fair that you pay to recover 100% of your data, when you don’t actually recover 100% of your data? Don’t you deserve to pay less since you recover so very little?

Spice IT Email Post
Nov 2011

Is your Data Secure in the Cloud?

Posted by Eran Farajun

One of the main concerns from end users about cloud storage is its security. “I am legally obliged to keep my data inside the country’s boundaries; where would you store it?” “How do I know it’s safe?” “How do I know I’m the only one that can access it?” These are all questions that cloud computing vendors and resellers have been striving to answer, and reassure their customers about since this service delivery model was first introduced.

However, today there is a variety of ways in which cloud solutions providers i.e. vendors, resellers and Managed Service Providers (MSPs), can near-guarantee data security and among the most sophisticated near-guarantee of security is encryption. This is a simple yet effective process that will put many customers’ minds at rest, and is therefore a powerful tool for the channel.

Before data leaves the end user’s datacentre it is encrypted at the source and it stays so while it gets transmitted to the cloud, essentially the data is encrypted at rest and in flight to ensure the data remains secure, where it also remains encrypted. Therefore, anyone trying to intercept this data while it is being transferred would only capture encrypted files; access to confidential content is hence not possible.

In order to access data in its un-encrypted form, it needs to be unlocked and the only key resides with the customer, ensuring that the stored version of the data is as safe and secure in the MSP’s datacentre as if it was in-house. Depending on the required level of security, keys can have between eight and 32 digits. So far, so secure.

Safeguards can be applied at various levels to ensure the security of customers’ data from cradle to grave including encryption key escrow management capability. This allows for an additional security provision to be put in place should a customer lose or forget their encryption key. Measures of security (or lack thereof) will often be a deal breaker so any reseller or cloud service provider looking for that extra element of differentiation should certainly look into having as many of these security measures in their portfolios. Amongst the most important factors is to ensure that the underlying technology vendor has a third-party certification of the encryption elements in its products, like a governmental body. It is not enough that a vendor claims their product is secure and it incorporates some form of cryptology. The real question is whether anyone has actually verified that the encryption was implemented properly so it cannot be defeated. This is the comfort level that a recognised third-party certification provides.

In the cloud data centre itself, the security of the data is protected even from datacentre operations staff due to its encrypted format. Cloud operations personnel do not have unauthorised access to the decryption key, meaning that customers should feel safe in the knowledge that their data is visible only to them. Building a level of trust such as this is “key” (excuse the pun) when establishing channel relationships, as trusted resellers are the ones to whom happy customers will return, and will be recommended to others.

It is details such as this that give good relationships the advantage; in order to provide the best possible service it is necessary to understand the technology being utilised and leverage it to each customer’s advantage. Thus, fears about the security of data in the cloud should be greatly reduced. Customers who feel happy with the level of security, support and flexibility provided are the ones with whom relationships will flourish.


Spice IT Email Post
Syndicate content

For more information

Get insights about cloud backup and recovery direct to your inbox every month.
Subscribe to our Newsletter
Stay connected to the latest data protection insights – subscribe to our blog.
Subscribe to our blog
Got questions for one of our recovery specialists?
Need Answers to your Questions?
Print this page
Email this page