Backup systems must be completed with computer maintenance .
When you are in the midst of adversities, it's too late to be cautious (Seneca)
The data is the essential element of any organization, being a key task in a business strategy to make backs of such data.
Copies of 1 er level - Raid configuration
Copy system on the server itself
The first measure is to have real -time system replicas on the server itself.
Raid is the acronym in English as a redundant of independent albums , there are different configurations to provide the system with greater integrity, tolerance to failures and speed.
The most used configuration is RAID 1, a solution to have mirror discs on the server itself, where all data is replicated in real time.
Normally two discs are used that function as one, so that if one fails one it is possible to continue working without stops, in addition, if the server allows it, the disk with problems can be hot replaced without the need to turn it off to be changed.
In the case of Raid 1, the probability of set of the set is equal to the product of the probabilities of failure of each of the discs and the reading performance is increased approximately as a linear multiple of the number of copies.
2nd level copies - NAS systems
Local copy system external to the server.
As a second safety measure, a network data storage device is implanted, commonly called NAS (from English Network Attalle Storage).
Copies are made through the local network of the data to be supported under prior configuration of the NAS device and preparation of the devices in which the data are found.
In turn, a NAS device can include additional security measures such as RAID.
IBM storage
- Suitable for median and large company
- It offers solutions for more demanding professional environments.
- Robust solutions and great guarantees of reliability.
- Powerful systems capable of supporting massive data volumes.
- New generation solutions of disk hybrid storage and flash memory or all flash that provide extraordinary performance for analytics in which the time factor is key.
- Reduces storage acquisition costs by compression in real -time hardware.
- Automated storage levels to automatically migrate data between storage levels according to real -time use analysis patterns.
- Cluster systems that facilitate horizontal and vertical scalability both in performance and capacity.
QNAP storage
- Suitable for small and medium enterprises
- Economic and professional solution for the storage of 2nd level backups
- QNAP systems are a powerful storage solution designed for intense I/O tasks.
- They offer a complete reliable and safe storage solution for SMEs.
- It allows managing, sharing and making backup copies of professional data.
- Possibility of introducing additional disc units through expansion chassis.
- It has models with improved high -performance encryption technology AES of 256 bits and antivirus to keep the information protected.
- They are also adequate as surveillance solutions, being able to monitor 4K high definition video at real time, recording, reproduction and management.
Copies of 3rd level - cloud backup
Externalized and independent cloud copy system to the company's infrastructure.
Having the data and copies in the same geographical place presents risks that can be the closure of the company.
Backup on Cloud is a solution for the protection of local data in the cloud.
Efficient incremental backups.
Possibility of storing backup copies with geographical replication, being able to have several copies in the cloud on different servers geographically distributed.
It contributes to compliance with the General Data Protection (GDPR) by having external backups and ensuring their correct recovery in case of local accident.
A website is available where you can see all the copies made, as well as those that have not been able to perform and the cause of it. However, you can receive a confirmation email that the backup has been made correctly or not.
In the installation of backup systems you can configure whether the data wants to be compressed or encrypted to be able to take them to the cloud without risks.
Our backup system has the detection of gross force attacks on backup files, communicating as soon as possible.
Together with the monitoring of backup copies, detailed reports, the reduction of time of climbing to the cloud by compression, make our backup system very competitive.