Baas (Backup as a Service) is another model of Cloud used to have an off-site copy of your Backup following the “3-2-1 Rule”. Secure Online Desktop offers two kind of BaaS as details below.
Secure Online Desktop as Service provider of the Veeam Cloud & Service Provider (VCSP) program can use Veeam Cloud Connect to offer customers Backup as a Service (BaaS). Every Veeam Backup & Replication v8 or v9 customer can then consume this service to send backups off site virtual machines (VMs).
Veeam® delivers powerful and reliable features and functionality to help you avoid the risk of catastrophic data loss. With Veeam Cloud Connect, you get:
Hosted off site backups: Get your backups off site to a hosted cloud repository through a secure SSL connection with
no additional Veeam licensing required
Complete visibility and control: Access and recover data
in hosted backup repositories directly from the backup console; track cloud repository consumption and receive reminders
for hosted storage renewals
A modern backup architecture: Leverage Veeam’s modern backup technology, including Backup Copy jobs with Built-in WAN Acceleration, forever incremental backups, GFS (grandfather-father-son) retention policies and more —
all built into one product
End-to-end encryption: Rest easy by encrypting all data
at source (before it leaves your network perimeter), in flight and at rest, without negatively impacting the data reduction ratios of built-in compression and WAN Acceleration.
Acronis BackupService powered by Secure Online Desktop solves data protection challenges with a proven comprehensive local and cloud backup and recovery managed service. Powered by the Acronis AnyData Engine, BackupService backs up disks, partitions, and files to your local storage or ServiceProvider’s secure data centers (powered by Secure Online Desktop) for quick recovery of selected files, folders, applications, or an entire system. BackupService even supports backup for iPhone, iPad, and Android mobile devices and Microsoft Office 365 mailboxes.
Estimated reading time: 5 minutes With the advent of big data platforms, IT security companies can now make guid… https://t.co/aTv41eq2Ir
Estimated reading time: 5 minutes Ogni anno cresce costantemente il numero di attacchi che minacciano la sicurezz… https://t.co/e1g9VBSYq9
Estimated reading time: 5 minutes Every year the number of attacks that threaten the security of devices, comput… https://t.co/MnoEKRNMwk
Estimated reading time: 7 minutes Il vishing è una particolare tipologia di phishing che sfrutta la tecnologia Vo… https://t.co/q9OO03jSHj
Estimated reading time: 5 minutes Come abbiamo già affrontato precedentemente negli scorsi articoli, i ransomware… https://t.co/O8xUUJocYc