As a BackupAssist reseller, you gain access to an online portal so you can place new orders, manage your customers licensing requirements and manage your account. With our ongoing commitment to our global channel partner program, we have recently released some new features that will help resellers manage their customers’ requirements. This article looks at these
Our previous article explained the importance of using encryption to protect your backups from unauthorized access. Now let’s look at how you can encrypt your backups using BackupAssist.
We often think of data protection as just backups, but encryption is also an important data protection consideration. This article looks at drive encryption, and how it is used to protect your data from unauthorized access.
A company or organization’s emails are not just a record of what car left its headlights on or whose birthday it is. Emails also contain a critical record of decisions, agreements, conversations and data. Protecting this information carries both legal and commercial obligations, and requires careful planning.
If you create and administer backups, you will have heard the term VSS. You may even know that VSS runs in the background while a backup takes place. Knowing that is usually enough but if you’re customizing your backups or encountering VSS problems it helps to know more.
Our previous article looked at what SMB 3.0 is in Windows Server 2012, and how it works. This article looks at the requirements for VSS with SMB 3.0, how to enable VSS support on a SMB 3.0 file share and how you can back up a remote VSS file share using BackupAssist.
Wouldn’t it be great if you could use something as simple as a Windows file server to store and share something as complex as a server application like Hyper-V and SQL? Microsoft asked itself the same thing and made this possible with the release SMB 3.0 in Windows Server 2012 and Window 8.
BackupAssist’s suite of backup types includes System Protection, our recommended backup type for Windows servers. This article looks at the requirements and advantages of different backup destinations for System Protection backups.
Data recovery is the process of taking a computer that cannot start itself and returning it to a previous operating state. This means a recovery has to start the computer and then recover its operating system, data and applications.
System Protection is a flexible backup technology that can be used to protect data and applications. As we mentioned in our previous article about Backup methods, System Protection creates an image that can be backed up incrementally.
It’s easy to see why so many people are using remote backups. You have scalable storage, no hardware to manage and a backup destination that you can access from anywhere with an internet connection. This is ideal for roaming users, home offices, remote sites and small businesses. Note: BackupAssist 10 has introduced a fully-featured Cloud Backup solution.
When planning a backup, the amount of time the backup job takes and the amount of storage used are key considerations. By backing up only the data that has changed, you can reduce both the time and storage space—but you must still be able to restore any data required, using those backups. This can be