Protecting your data from the unexpected isn’t just a good idea – it’s a necessity. While most organizations have a data protection and recovery strategy which requires data backup, the specific design and configuration of the backup solution depends on numerous factors such as the nature of the data, backup policies, regulatory requirements, overall risk tolerance, and budget.
Strongman Technologies offers managed backup solutions with the reliability, security and ease-of-use you demand. And as your business grows and requirements change, you can cost-effectively upgrade, add options and extend solutions as necessary.
When you outsource your data backup to Strongman Tech’s expert administrators, you’re free to focus on running your business.
Key Features of Managed Backup
Small Backup Windows
Only changed disk blocks are copied between backups. Incremental backups can be completed in minutes.
Open File Backups
Includes built-in support for backing up open files, i.e. files that are currently in use or being changed.
Includes consistent point-in-time, system-wide backup images which streamline access to stored data and increase protection against logical data errors and media failures of the original copy.
During normal host operation, the backup software keeps a journal of disk changes which allows the system to be restored to the point of the most recent modification. Incremental backups know which blocks on the disk changed before the backup even starts, eliminating the need for file-by-file or block-by-block comparisons with every backup.
Incremental sector-based backups ignore unused portions of the disk and copy only the disk sectors that have changed since the last backup. When used with traditional compression, this reduces backup storage by as much as 90% compared to a traditional system-wide, file-by-file backup.
End-to-End Strong Encryption
Data is continuously encrypted while in storage and during network transmission using RSA keys. Decryption during a restore is only possible when the encryption key holder enters their pass phrase. This automated process ensures your sensitive data remains secure in transit to its destination.
During backup and restore, data is verified using MD5 checksums.