85 S Bragg St, Suite 600-F, Alexandria VA 22312240-770-2097contact@secsofttech.com9am - 5pm

DISASTER RECOVERY, BACKUP & RESTORE

Companies can instantly bring systems online in our cloud when hardware failure or natural disasters occur. Encrypted data is safely maintained with regards to Confidentiality, Integrity, and Availability (CIA).

EFFICIENTLY MANAGE BACKUP AND DR STORAGE AND REDUCE COST

Storage costs are efficiently managed by allowing a more effective use of local and offsite appliance storage allocation. (By keeping the most recent or important backups on a local appliance with the remainder archived to the SST cloud, local and replication retention policies are managed separately)

 

15 MINUTE FAILOVER GUARANTEE

Guarantees to bring any system back online in SST cloud in 15 minutes or less from time of the disaster

 

CENTRAL DEPLOYMENT AND MANAGEMENT

Appliance backup settings and schedules as well as recoveries can be accessed over the WAN from a central management console or limited to LAN/VPN access for environments requiring greater security. *VPN (Virtual Private Network)

 

ENDPOINT PROTECTION (INCLUDING RANSOMWARE)

Endpoints including laptops, desktops and mobile devices are protected.  Since ransomware is usually disseminated via phishing and web downloads, endpoint protection is increasingly vital to guarding against today’s most pervasive threats.

 

SINGLE PANE OF GLASS

Easily manage and monitor backups remotely in real time, and troubleshoot issues. (Account usage, activity alerts, Anomaly Detection, retention management, reporting and monitoring, and advanced policy settings.)

 

GEOLOCATION & REMOTE WIPE

Easily locate lost or stolen devices. You can delete any business-critical data on remote devices with push-button ease.

 

BUILT-IN ORCHESTRATION & AUTOMATION

Set efficient workflows, including the ability to edit and modify workflows using our graphical orchestration workflow editor

 

TRIPLE LAYER ENCRYPTION & THE KEY

Encrypts data in-transit and at rest. Private key encryption (optional) giving you (and only you) the ability to view or decrypt your data in the cloud.

MULTI-FACTOR AUTHENTICATION (OPTIONAL)

Only trusted and authenticated administrators can access your company’s dashboard to better control device and data access.

 

ANOMALY DETECTION/EARLY DETECTION

By tracking the backup trends across client mobile devices and reporting the event details, an anomaly warning reports when the ‘new’ or ‘changed’ file count surpasses a user-defined benchmark

 

SEAMLESS CONTINUITY OPTION USING SST’S FAILOVER TO THE CLOUD PROVISION

Helps businesses minimize downtime with RDP (Remote Desktop Protocol) access (For Windows and Linux machines, administrators can right-click backups and choose any version of a machine’s backup to be booted and run directly in the SST cloud, with RDP access)

 

Hyper-V & VMware Agentless Backup & DR

Save additional time, money, and reduce risk of downtime due to human error.

 

LOCAL GRANULAR DISASTER RECOVERY WITH EASE

Windows and Linux systems that have been backed up onto an on premise SST appliance (Cloud Failover series) can be run directly on the appliance by simply right-clicking a backup and selecting “boot.” In a matter of minutes, administrators will have VNC access to a live running machine. Once ready, the machine(s) can be powered off, backed up and recovered to production environments, including recovery to an existing vSphere environment. *VNC (Virtual Network Computing)

 

FULL AND GRANULAR RECOVERY

Utilizing universal VSS writer support which ensures the consistency of application data when a shadow copy is created, SST’s DRaaS platform is capable of backing up databases like SQL, SAP and Exchange with additional support for mailbox level recovery of Exchange databases and file-level recovery for backups of Windows and Linux machines.

 

SECURE, OFFSITE REPLICATION

For maximum efficiency, the replication is secured with encryption to protect data against unauthorized access during data transfer

DEVICES AND OS’S PROTECTED

Protects data and applications, including physical and virtual servers, laptops/desktops, and mobile devices.  Supports most popular operating systems, including Windows, UNIX, Linux, AIX, VMware, Mac, and Android

PHYSICAL & VIRTUAL SERVERS

VMware and Hyper-V environments and natively protects Windows, SQL, SharePoint and Exchange data too.

Menu