Knowledge

Remote backup service

Source 📝

410:
single provider and can effortlessly move their data to another provider or back to a dedicated Private or Hybrid Cloud. The security of customer data is of utmost importance, and service providers take all necessary measures to ensure that customer data is always kept private and secure. Such security measures include making sure that customer data is never accessible to other customers. Service providers should also only access customer data with explicit permission. By adhering to these strict security measures, Cloud Backup providers can offer peace of mind to their customers and build trust in their services, making it a reliable and trustworthy data backup solution for businesses of all sizes.
526:
Allows the service to back up continuously or on a predefined schedule. Both methods have advantages and disadvantages. Most backup services are schedule-based and perform backups at a predetermined time. Some services provide continuous data backups which are used by large financial institutions and
700:
Most remote backup services reduce the amount of data to be sent over the wire by only backing up changed files. This approach to backing up means that the customers total stored data is reduced. Reducing the amount of data sent and also stored can be further drastically reduced by only transmitting
576:
Off-Line Backup allows along with and as part of the online backup solution to cover daily backups in time when network connection is down. At this time the remote backup software must perform backup onto a local media device like a tape drive, a disk or another server. The minute network connection
314:
In the mid-1980s, the computer industry was in a great state of change with modems at speeds of 1200 to 2400 baud, making transfers of large amounts of data slow (1 MB in 72 minutes). While faster modems and more secure network protocols were in development, tape backup systems gained in popularity.
366:
Cloud backup needs to be an active process where data is collected from systems that store the original copy. This means that cloud backup will not require data to be copied into a specific appliance from where data is collected before being transmitted to and stored in the service provider's data
322:
in the late 1990s. The initial years of these large industry service providers were about capturing market share and understanding the importance and the role that these online backup providers were playing in the web services arena. Today, most service providers of online backup services position
490:
Recent improvements in CPU availability allow increased use of software agents instead of hardware appliances for enterprise cloud backup. The software-only approach can offer advantages including decreased complexity, simple scalability, significant cost savings and improved data recovery times.
409:
Cloud Backup is a modern and efficient data backup solution that operates on a native cloud multitenant platform. This advanced platform is specifically designed to share resources among users, which makes data mobility possible for customers. With this solution, customers are not restricted to a
297:
Online backup systems are typically built for a client software program that runs on a given schedule. Some systems run once a day, usually at night while computers aren't in use. Other newer cloud backup services run continuously to capture changes to user systems nearly in real-time. The online
696:
Some vendors limit the number of versions of a file that can be kept in the system. Some services omit this restriction and provide an unlimited number of versions. Add-on features (plug-ins), like the ability to back up currently open or locked files, are usually charged as an extra, but some
533:
The ability for users to restore files themselves, without the assistance of a Service Provider by allowing the user select files by name and/or folder. Some services allow users to select files by searching for filenames and folder names, by dates, by file type, by backup set, and by
470:
The same is important for the compression of backup data. The local backup cache is used to compress the data before sending it to the cloud in order to lower the network bandwidth load and improve backup speed. This becomes critical for enterprises which backup huge databases like
331:(Platform as a service) strategy and its relevance is predicted to increase exponentially in the years to come as personal and enterprise data storage needs rise. The last few years have also witnessed a healthy rise in the number of independent online backup providers. 393:
Cloud BUR enables a Service Provider to allocate storage capacity to a customer. If that customer later deletes their data or no longer needs that capacity, the Service Provider can then release and reallocate that same capacity to a different customer in an automated
404:
Cloud Backup allows customers to align the value of data with the cost of protecting it. It is procured on a per-gigabyte per month basis. Prices tend to vary based on the age of data, type of data (email, databases, files etc.), volume, number of backup copies and
301:
There are many products on the market – all offering different feature sets, service levels, and types of encryption. Providers of this type of service frequently target specific market segments. High-end LAN-based backup systems may offer services such as
630:
Some businesses are required to comply with government regulations that govern privacy, disclosure, and legal discovery. A service provider that offers this type of service assists customers with proper compliance with and understanding of these
761:
Residential broadband services often have monthly limits that preclude large backups. They are also usually asymmetric; the user-to-network link regularly used to store backups is much slower than the network-to-user link used only when data is
443:
Hybrid cloud backup is also beneficial for enterprise users who have security concerns. When storing data locally before sending it to the cloud, backup users can perform the necessary encryption operations, incl. technologies like:
748:
Depending on the available network bandwidth, the restoration of data can be slow. Because data is stored offsite, the data must be recovered either via the Internet or via a disk shipped from the online backup service
345:
The assurance, guarantee, or validation that what was backed up is recoverable whenever it is required is critical. Data stored in the service provider's cloud must undergo regular integrity validation to ensure its
623:
Multiple copies of data backed up at different locations. This can be achieved by having two or more mirrored data centers, or by keeping a local copy of the latest version of backed up data on site with the
583:
Many services support data synchronization allowing users to keep a consistent library of all their files across many computers. The technology can help productivity and increase access to data.
306:, client remote control, or open file backups. Consumer online backup companies frequently have beta software offerings and/or free-trial backup services with fewer live support options. 755:
It is possible that a remote backup service provider could go out of business or be purchased, which may affect the accessibility of one's data or the cost to continue using the service.
390:
Cloud BUR enables flexible allocation of storage capacity to customers without limit. Storage is allocated on demand and also de-allocated as customers delete backup sets as they age.
617:
Some services offer a higher level of support to businesses that might request immediate help, proactive monitoring, personal visits from their service provider, or telephone support.
363:
The interface used by the customer needs to enable the selection of data to protect or recover, the establishment of retention times, destruction dates as well as scheduling.
556:
A way to further minimize network traffic is to transfer only the binary data that has changed from one day to the next, similar to the open source file transfer service
425:
encrypts and transmits data to a service provider. This adds protection against local disasters. Recent backups are retained locally, to speed data recovery operations.
377:
Cloud BUR utilizes standard networking protocols (which today are primarily but not exclusively IP based) to transfer data between the customer and the service provider.
639:
Ability to send a first backup on a portable storage device rather than over the Internet when a user has large amounts of data that they need quickly backed up.
705:
that transmit only these changed binary data bits do not waste bandwidth by transmitting the same file data over and over again if only small amounts change.
380:
Vaults or repositories need to be always available to restore data to any location connected to the Service Provider's Cloud via private or public networks.
842: 245: 935: 298:
backup system typically collects, compresses, encrypts, and transfers the data to the remote backup service provider's servers or off-site hardware.
315:
During that same period the need for an affordable, reliable online backup system was becoming clear, especially for businesses with critical data.
421:
Hybrid cloud backup works by storing data to local disk so that the backup can be captured at high speed, and then either the backup software or a
418:
An enterprise-class cloud backup solution must include an on-premises cache, to mitigate any issues due to inconsistent Internet connectivity.
847: 507:
should be at least 256 bits, and the user should have the option of using his own encryption key, which should never be sent to the server.
948: 837: 999: 852: 765:
In terms of price, when looking at the raw cost of hard disks, remote backups cost about 1-20 times per GB what a local backup would.
608:
Many businesses require a flexible file retention policy that can be applied to an unlimited number of groups of files called "sets".
540:
Some services allow you to access backed-up files via a normal web browser. Many services do not provide this type of functionality.
717:
Remote backup does not require user intervention. The user does not have to change tapes, label CDs or perform other manual steps.
758:
If the encryption password is lost, data recovery will be impossible. However, with managed services this should not be a problem.
1040: 909: 577:
is restored remote backup software will update the remote datacenter with the changes coming out of the off-line backup media .
702: 287: 238: 152: 961: 428:
There are a number of cloud storage appliances on the market that can be used as a backup target, including appliances from
774:
Some services provide expert backup management services as part of the overall offering. These services typically include:
831: 290:
are companies that provide this type of service to end users (or clients). Such backup services are considered a form of
147: 121: 653:. This requires not only regular file-based approach, but specific point-in-time backups and restores for databases. 729:
Most remote backup services will use a 128 – 2048 bit encryption to send data over unsecured links (e.g. internet).
96: 806:
Event-based Backup – backup of data is triggered by some computer events, e.g. database or application stoppage (
484: 231: 63: 36: 503:
Data should be encrypted before it is sent across the internet, and it should be stored in its encrypted state.
360:
The customer should never have to manage the back end storage repositories in order to back up and recover data.
1035: 872: 645:
Many businesses require backups of servers and the special applications or databases that run on them, such as
596:
A way to restore data from a portable storage device when a full restore over the Internet might take too long.
514: 78: 44: 602:
Allows for an IT department or staff member to monitor and manage backups & restores for the regular user.
875:– The practice of sending data off-site for safe keeping, but not necessarily using a remote backup service. 867: 661:
Keeps multiple past versions of files to allow for rollback to or restoration from a specific point in time.
354: 781:
Continuous monitoring of the backup processes on the client machines to ensure that backups actually happen
1050: 357:). One size does not fit all either for the customers or the applications within a customer's environment. 58: 974: 1030: 567: 422: 219: 178: 173: 137: 132: 127: 101: 527:
large online retailers. However, there is typically a trade-off with performance and system resources.
857: 821: 547: 476: 168: 142: 460:
Configurable TLS (SSL) communications encryption between each component (storage, client and cloud)
214: 183: 87: 878: 807: 472: 350: 27:
Service that provides users with a system for the backup, storage, and recovery of computer files
467:
Data encryption should additionally be applied when you choose a public cloud service provider.
650: 520: 68: 987:
Scheduled backups of SQL Server or SQL Server Express databases (without version limitation).
898:
Vendor Landscape Storyboard: Cloud Backup. InfoTech Research Group Research, July 2011. p. 4
612: 303: 1045: 480: 291: 73: 723:
Some remote backup services will work continuously, backing up files as they are changed.
560:. More advanced online backup services use this method rather than transfer entire files. 429: 986: 752:
Some backup service providers have no guarantee that stored data will be kept private.
513:
A backup service supporting network backup can back up multiple computers, servers or
1024: 826: 283: 1015: 862: 796:
There are three distinct types of backup modes: scheduled, manual and event-based.
634: 457:
CRAM-MD5 password authentication between each component (storage, client and cloud)
319: 454:
Verification of files previously catalogued, permitting a Tripwire-like capability
732:
A few remote backup services can reduce backup by only transmitting changed data.
670:
Online backup services are usually priced as a function of the following things:
318:
More online/remote backup services came into existence during the heyday of the
209: 204: 504: 437: 433: 17: 646: 353:) services need to provide a variety of granularity when it comes to RTO's ( 726:
Most remote backup services will maintain a list of versions of your files.
720:
Unlimited data retention (presuming the backup provider stays in business).
744:
Remote backup has some disadvantages over traditional backup methods:
463:
Computation of MD5 or SHA1 signatures of the file data, if configured
279: 1000:
Are online backups worth it? How much are you paying per GB at home?
936:
Hybrid cloud backup: D2D2C emerging as a viable data backup strategy
701:
the changed data bits by binary or block level incremental backups.
517:
appliances on a local area network from a single computer or device.
800:
Scheduled Backup – data is backed up according to a fixed schedule.
570:; it may be possible to set this to change at various times of day. 557: 328: 324: 117: 713:
Remote backup has advantages over traditional backup methods:
448:
Data encryption cipher (AES 128, AES192, AES256 or blowfish)
803:
Manual Backup – backup of data is triggered by user input.
683:
The maximum number of versions of each file that are kept.
910:"Cloud backup options: Pure cloud vs hybrid cloud backup" 278:, is a service that provides users with a system for the 784:
Proactive alerting in the event that any backups fail
680:
The number of machines covered by the backup service.
550:
algorithm to minimize the amount of bandwidth used.
962:The pros and cons of cloud backup technologies 483:images or mail server databases (EDB files of 239: 8: 1002:. Best Backups.com. Retrieved on 2013-08-10. 843:Comparison of file synchronization software 792:Scheduled vs. manual vs. event-based backup 787:Assistance in restoring and recovering data 735:Manage and secure digital data information. 692:The level of service and features available 686:Data retention and archiving period options 566:User-selectable option to use more or less 246: 232: 31: 778:Assistance configuring the initial backup 674:The total amount of data being backed up. 546:Data will typically be compressed with a 677:The total amount of data being restored. 891: 423:D2D2C (Disk to Disk to Cloud) appliance 191: 160: 109: 86: 50: 43: 998:Zaborszky, Peter. (16 November 2012) 689:Managed backups vs. Unmanaged backups 7: 949:Does Cloud Backup Need An Appliance? 848:Comparison of online backup services 451:Windows Encrypting File System (EFS) 951:" Storage Switzerland, 14 June 2012 838:Comparison of file hosting services 834:(includes managed backup providers) 1016:NIST definition of Cloud Computing 853:Comparison of online music lockers 588:Common features for business users 25: 977:” SearchSMBStorage, October 2008 697:services provide this built in. 110:Application-specific web hosting 649:, SQL, ERP- or CRM-systems and 964:” SearchDataBackup, March 2009 938:. SearchDataBackup, 2 May 2011 599:Centralized management console 1: 832:Comparison of backup software 553:Differential data compression 414:Enterprise-class cloud backup 523:– Continuous Data Protection 327:(software as a service) and 282:, storage, and recovery of 1067: 908:Martin Taylor (May 2012). 323:their services using the 873:Off-site data protection 515:Network Attached Storage 270:, sometimes marketed as 45:Internet hosting service 975:Backup as a service FAQ 868:List of backup software 605:File retention policies 355:Recovery Time Objective 288:Online backup providers 1041:Online backup services 537:Online access to files 268:managed backup service 59:Virtual private server 960:Whitehouse, Lauren. " 770:Managed vs. unmanaged 627:Regulatory compliance 128:Guild hosting service 51:Full-featured hosting 858:File hosting service 822:Attix5 Online Backup 548:lossless compression 530:File-by-File Restore 385:Scalable and elastic 351:BackUp & Restore 479:or huge files like 276:backup-as-a-service 914:computerweekly.com 879:Shared disk access 651:directory services 521:Continuous backup 372:Ubiquitous access 256: 255: 161:By content format 69:Colocation centre 64:Dedicated hosting 16:(Redirected from 1058: 1003: 996: 990: 984: 978: 971: 965: 958: 952: 945: 939: 932: 926: 925: 923: 921: 905: 899: 896: 613:managed services 543:Data compression 495:Typical features 304:Active Directory 248: 241: 234: 32: 21: 1066: 1065: 1061: 1060: 1059: 1057: 1056: 1055: 1036:Backup software 1021: 1020: 1012: 1007: 1006: 997: 993: 985: 981: 972: 968: 959: 955: 946: 942: 933: 929: 919: 917: 907: 906: 902: 897: 893: 888: 883: 817: 794: 772: 742: 711: 668: 590: 580:Synchronization 573:Off-Line Backup 563:Bandwidth usage 497: 481:virtual machine 416: 401: 387: 374: 346:recoverability. 342: 337: 335:Characteristics 312: 292:cloud computing 252: 74:Cloud computing 28: 23: 22: 15: 12: 11: 5: 1064: 1062: 1054: 1053: 1048: 1043: 1038: 1033: 1023: 1022: 1019: 1018: 1011: 1010:External links 1008: 1005: 1004: 991: 979: 966: 953: 947:Slack, Eric. " 940: 927: 900: 890: 889: 887: 884: 882: 881: 876: 870: 865: 860: 855: 850: 845: 840: 835: 829: 824: 818: 816: 813: 812: 811: 804: 801: 793: 790: 789: 788: 785: 782: 779: 771: 768: 767: 766: 763: 759: 756: 753: 750: 741: 738: 737: 736: 733: 730: 727: 724: 721: 718: 710: 707: 694: 693: 690: 687: 684: 681: 678: 675: 667: 664: 663: 662: 659: 655: 654: 643: 640: 637: 632: 628: 625: 621: 618: 615: 609: 606: 603: 600: 597: 594: 589: 586: 585: 584: 581: 578: 574: 571: 564: 561: 554: 551: 544: 541: 538: 535: 531: 528: 524: 518: 511: 510:Network backup 508: 501: 496: 493: 465: 464: 461: 458: 455: 452: 449: 430:CTERA Networks 415: 412: 407: 406: 400: 399:Metered by use 397: 396: 395: 391: 386: 383: 382: 381: 378: 373: 370: 369: 368: 364: 361: 358: 347: 341: 338: 336: 333: 311: 308: 284:computer files 254: 253: 251: 250: 243: 236: 228: 225: 224: 223: 222: 217: 212: 207: 202: 194: 193: 189: 188: 187: 186: 181: 176: 171: 163: 162: 158: 157: 156: 155: 153:Social network 150: 145: 140: 135: 130: 125: 112: 111: 107: 106: 105: 104: 99: 91: 90: 84: 83: 82: 81: 76: 71: 66: 61: 53: 52: 48: 47: 41: 40: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 1063: 1052: 1051:Cloud storage 1049: 1047: 1044: 1042: 1039: 1037: 1034: 1032: 1029: 1028: 1026: 1017: 1014: 1013: 1009: 1001: 995: 992: 988: 983: 980: 976: 970: 967: 963: 957: 954: 950: 944: 941: 937: 934:Boles, Jeff. 931: 928: 915: 911: 904: 901: 895: 892: 885: 880: 877: 874: 871: 869: 866: 864: 861: 859: 856: 854: 851: 849: 846: 844: 841: 839: 836: 833: 830: 828: 827:Cloud storage 825: 823: 820: 819: 814: 809: 805: 802: 799: 798: 797: 791: 786: 783: 780: 777: 776: 775: 769: 764: 760: 757: 754: 751: 747: 746: 745: 740:Disadvantages 739: 734: 731: 728: 725: 722: 719: 716: 715: 714: 708: 706: 704: 698: 691: 688: 685: 682: 679: 676: 673: 672: 671: 665: 660: 657: 656: 652: 648: 644: 642:Server backup 641: 638: 636: 633: 629: 626: 622: 619: 616: 614: 610: 607: 604: 601: 598: 595: 592: 591: 587: 582: 579: 575: 572: 569: 565: 562: 559: 555: 552: 549: 545: 542: 539: 536: 532: 529: 525: 522: 519: 516: 512: 509: 506: 502: 499: 498: 494: 492: 488: 486: 482: 478: 474: 468: 462: 459: 456: 453: 450: 447: 446: 445: 441: 439: 435: 431: 426: 424: 419: 413: 411: 403: 402: 398: 392: 389: 388: 384: 379: 376: 375: 371: 365: 362: 359: 356: 352: 348: 344: 343: 340:Service-based 339: 334: 332: 330: 326: 321: 316: 309: 307: 305: 299: 295: 293: 289: 285: 281: 277: 273: 269: 265: 261: 249: 244: 242: 237: 235: 230: 229: 227: 226: 221: 218: 216: 213: 211: 208: 206: 203: 201: 200:Remote backup 198: 197: 196: 195: 190: 185: 182: 180: 177: 175: 172: 170: 167: 166: 165: 164: 159: 154: 151: 149: 146: 144: 141: 139: 136: 134: 131: 129: 126: 123: 119: 116: 115: 114: 113: 108: 103: 100: 98: 95: 94: 93: 92: 89: 85: 80: 77: 75: 72: 70: 67: 65: 62: 60: 57: 56: 55: 54: 49: 46: 42: 38: 34: 33: 30: 19: 18:Remote backup 1031:File hosting 994: 982: 969: 956: 943: 930: 918:. Retrieved 916:. TechTarget 913: 903: 894: 863:File sharing 795: 773: 743: 712: 699: 695: 669: 666:Cost factors 635:Seed loading 593:Bulk restore 489: 469: 466: 442: 427: 420: 417: 408: 320:dot-com boom 317: 313: 300: 296: 275: 272:cloud backup 271: 267: 263: 259: 257: 199: 79:Peer-to-peer 29: 920:3 September 808:cold backup 349:Cloud BUR ( 210:Home server 205:Game server 192:Other types 148:Application 88:Web hosting 1025:Categories 886:References 709:Advantages 658:Versioning 620:Redundancy 505:Encryption 500:Encryption 438:TwinStrata 434:StorSimple 143:Wiki farms 762:restored. 749:provider. 703:Solutions 647:groupware 624:business. 568:bandwidth 102:Clustered 815:See also 485:Exchange 394:fashion. 122:comments 37:a series 35:Part of 367:centre. 310:History 1046:Backup 611:Fully 477:MS SQL 473:Oracle 280:backup 264:online 260:remote 97:Shared 631:laws. 558:Rsync 534:tags. 405:RTOs. 266:, or 220:Email 184:Music 179:Video 174:Image 138:Video 133:Image 922:2015 436:and 329:PaaS 325:SaaS 169:File 118:Blog 487:). 475:or 274:or 215:DNS 1027:: 912:. 810:). 440:. 432:, 294:. 286:. 262:, 258:A 39:on 989:. 973:“ 924:. 247:e 240:t 233:v 124:) 120:( 20:)

Index

Remote backup
a series
Internet hosting service
Virtual private server
Dedicated hosting
Colocation centre
Cloud computing
Peer-to-peer
Web hosting
Shared
Clustered
Blog
comments
Guild hosting service
Image
Video
Wiki farms
Application
Social network
File
Image
Video
Music
Remote backup
Game server
Home server
DNS
Email
v
t

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.