Two ways to implement your BaaS (Backup as a Service)
BaaS (Backup as a Service) is the service that allows your company to save a copy (off-site copy) of data in Cloud. In this way, you can store your information in a safe place and then restore it at any time in case of disaster.
BaaS is one of the ways to implement backup 3-2-1 rule.
Secure Online Desktop provides its customers with two different ways to implement BaaS to offer a range of different options based on different business needs.
Backup as a Service
The first BaaS (Backup as a Service) solution uses the well-known Veeam technology, widely used by millions of customers around the world, to extend its Veeam local installation to Secure Online Desktop Cloud. The related service is called Veeam Cloud Connect and allows Veeam users to select Secure Online Desktop as a cloud service provider directly from the Veeam console via the “BACKUP INFRASTRUCTURE -> ADD SERVICE PROVIDER” panel or by searching it with the “FIND SERVICE PROVIDER” link.
Pros and cons of the Veeam Cloud Connect solution
1) No installation – No additional software or hardware devices are needed in the company;
2) Simplicity – The customer can turn on Cloud Provider functionality from the Veeam Backup & Replication console with a simple click;
3) No new console – You will not need to use a new tool or access additional consoles because all Cloud backups are perfectly visible within the already existing Veeam Backup & Replication console;
4) No VPN – There is no need to establish any additional encrypted channel between the client and the Secure Online Desktop as communications are encrypted through SSL during transit and are encrypted to the source with AES algorithm.
5) WAN Accelerator – With Veeam’s WAN accelerator capability, you can optimize backup communications to reduce time and optimize Internet bandwidth usage.
1) It is necessary to have the Veeam solution already in the company;
2) Only the devices supported by the Veeam solution can be protected from backup.
The second BaaS solution uses instead of Acronis technology and its Anydata engine. Similarly to the first, this service allows you to have an off-site copy on our Cloud and to perform full recovery (the entire virtual machine in case of virtualized environments) or partial (the single file or folder) of your data with a simple click.
Pros and cons of the Acronis Cloud Backup solution
1) No other backup software is required – Within the service, the software agents needed to operate with Cloud Backup System will be provided. This way the service can also be used for local copies;
2) Full Protection – Acronis Cloud Backup covers many types of devices, applications, and operating systems including mobile devices;
3) No limit on systems to be protected – The service is billed only on the basis of the storage size in Cloud without any limit on the number of systems to be covered by backup;
4) Local backups – The software agents provided by the service and its backup policies allow you to keep backup over even on any local storage at your site without any additional cost.
1) It is necessary to install or distribute agents on all systems that you want to cover from the service.
- SIEM software: what it is and how it works
- Updating php: why and how
- What is a Network Lateral Movement and how to defend yourself
- Mitre Att&ck ™: an overview
- Is SOCaaS useful for your business?
- Computer network security: PT vs. VA
- Cloud services for small local businesses
- Cloud computing services in Reggio Emilia
- Backup as a Service (2)
- Cloud Conference (3)
- Cloud CRM (1)
- Cloud Server/VPS (17)
- Conferenza Cloud (2)
- ICT Monitoring (3)
- Log Management (1)
- News (15)
- ownCloud (4)
- Privacy (6)
- Secure Online Desktop (13)
- Security (5)
- Web Hosting (7)
- Microsoft: Ransomware & Nation-State Attacks Rise, Get More Sophisticated
- DDoS Attacks Soar in First Half of 2020
- Re: Navy Federal Reflective Cross Site Scripting (XSS)
- CVE-2020-24721: Corona Exposure Notifications API: risk of coercion/data leakage [vs]
- New Campaign by China-Linked Group Targets US Orgs for First Time
- Securing Slack: 5 Tips for Safer Messaging, Collaboration
- Vulnerability in Wireless Router Chipsets Prompts Advisory
- Shifting Left of Left: Why Secure Code Isn't Always Quality Code
- Cybersecurity: l’Europa testa la sua sicurezza cibernetica con l’esercitazione Blue OLEx
- Critical Information Disclosure on WP Courses plugin <= 2.0.29 exposes private course videos and materials
- [SYSS-2020-025] DOMOS 5.8 - OS Command Injection
- [SYSS-2020-024] Qiata FTA - Persistent Cross-Site Scripting
- [SYSS-2019-049] Insufficient Session Expiration (CWE-613) in REDDOXX MailDepot (CVE-2019-19199)
- Regarding the semi-recent OnBase vulnerabilities
- State-Sponsored Hacking Groups Increasingly Use Cloud & Open Source Infrastructure
Nuovo servizio SOCaaS (Security Operation Center as a Service) powered by Secure Online Desktop… https://t.co/dp5bvA94VQ
In today's article, we'll explain what a Security Operations Center (SOC) is and help determine if a SOC-as-a-Servi… https://t.co/z7mOAe6nh0
Nell'articolo di oggi, spiegheremo cos'e' un Security Operations Center (SOC) e aiuteremo a determinare se una solu… https://t.co/l2NT6hzQc5
The security of computer networks is of vital importance for a company. With technologies increasingly relying on r… https://t.co/Zbaf4mL1D5
La sicurezza delle reti informatiche e' di vitale importanza per un'azienda. Con le tecnologie che fanno sempre piu… https://t.co/NJWcr9rpnz