SlideShare a Scribd company logo
The 5 Components of
Compliant Backups
for Financial Services
Firms
www.bumi.com
Component #1: Security & Encryption

www.bumi.com
Component #1: Security & Encryption

Does the provider have the following:
1.Military grade AES encryption technology up
to 256 bit. FIPS 140-2 certification.
2.LAN security policies that allows data to only
be accessed by those with administrative
rights.
3.User authentication and role-based access

www.bumi.com
Component #1: Security & Encryption

In addition, you should ask:
1.Is the data both transmitted and stored in
encrypted and compressed format?
2.Is there a Client/Server authentication
protocol to ensure that no one can restore
your data to alternate hardware without
authorization?

www.bumi.com
Component #2: Tamper-Proof Storage

www.bumi.com
Component #2: Tamper-Proof Storage

Is the data stored in a tamper-proof,
non-erasable and encrypted format?
WORM (Write Once, Read Many) devices used
to be the standard. But as optical media
became too expensive, the rules were changed
to allow software solutions that encrypt the
data and keep it from being tampered with.
www.bumi.com
Component #3: Audit Trail

www.bumi.com
Component #3: Audit Trail

Does the solution provide:
1.

An audit trail of all backups and restores?

2.

What about destruction certificates of
deleted data?

3.

Serialized originals and, if applicable,
duplicate units of storage media with a
time-date record?

www.bumi.com
Component #4: Archive and Retention Rules

www.bumi.com
Component #4: Archive and Retention Rules

There’s this magical #7 out there…
Everyone thinks they need to keep their data
for 7 years.
The truth is that the rules vary, so it’s
important to have highly customizable archive
and retention rules configured based on
specific business needs.
www.bumi.com
Component #5: 24/7 Availability

www.bumi.com
Component #5: 24/7 Availability

Be sure the solution provides 24x7
availability of encrypted data for
examination by representatives of
regulatory bodies and for emergency
restores.

www.bumi.com
BUMI Background
• BUMI is a premium provider specializing in online
data backup and recovery services
• Focused on professional services market
• Privately owned and self-funded (debt free and
profitable)
• Founded in 2002
• Headquartered in New York City with two leased
SSAE-16 Type I & II data centers located in Canada

www.bumi.com
For more information, visit:
http://bumi.com/customers/financial-services/

sales@bumi.com
212.599.7800
90 Broad Street, FL 6
New York, NY 10004
www.bumi.com

More Related Content

Viewers also liked

promedio de vida en libia
promedio de vida en libiapromedio de vida en libia
promedio de vida en libia
monse603
 
Selesaikan masalah
Selesaikan masalahSelesaikan masalah
Selesaikan masalah
SAFA8889
 
áLcool(1)
áLcool(1)áLcool(1)
áLcool(1)
Leo Fernandes
 
Tutorial de dropbox
Tutorial de dropboxTutorial de dropbox
Tutorial de dropbox
Eduardo Cornejo Flores
 
The End of Free Social - Sparkloft Media
The End of Free Social - Sparkloft MediaThe End of Free Social - Sparkloft Media
The End of Free Social - Sparkloft Media
Travel Oregon
 
SIcenterAndProgramSmall01-07-15
SIcenterAndProgramSmall01-07-15SIcenterAndProgramSmall01-07-15
SIcenterAndProgramSmall01-07-15
hitoshi ujiie
 
Cfop remessa para armazenagem
Cfop remessa para armazenagemCfop remessa para armazenagem
Cfop remessa para armazenagem
registro armazéns gerais
 
La informacion angiie
La informacion angiieLa informacion angiie
La informacion angiie
saludcoopsur
 
Bahagi pecahan
Bahagi pecahanBahagi pecahan
Bahagi pecahan
Mohd Ahmad
 
Certificate_3
Certificate_3Certificate_3
Certificate_3
Deepak Kamboj
 
Hdp chamba mayra
Hdp chamba mayraHdp chamba mayra
Reglamento general de la UNEFA
Reglamento general de la UNEFAReglamento general de la UNEFA
Reglamento general de la UNEFA
Betzi Lira
 
General Description Detail Groto
General Description Detail GrotoGeneral Description Detail Groto
General Description Detail Groto
The House of Perle
 
Presentación Sandra Jaramilli y Aba Bernardi - eModa Day Buenos Aires 2015
Presentación Sandra Jaramilli y Aba Bernardi - eModa Day Buenos Aires 2015Presentación Sandra Jaramilli y Aba Bernardi - eModa Day Buenos Aires 2015
Presentación Sandra Jaramilli y Aba Bernardi - eModa Day Buenos Aires 2015
eCommerce Institute
 

Viewers also liked (14)

promedio de vida en libia
promedio de vida en libiapromedio de vida en libia
promedio de vida en libia
 
Selesaikan masalah
Selesaikan masalahSelesaikan masalah
Selesaikan masalah
 
áLcool(1)
áLcool(1)áLcool(1)
áLcool(1)
 
Tutorial de dropbox
Tutorial de dropboxTutorial de dropbox
Tutorial de dropbox
 
The End of Free Social - Sparkloft Media
The End of Free Social - Sparkloft MediaThe End of Free Social - Sparkloft Media
The End of Free Social - Sparkloft Media
 
SIcenterAndProgramSmall01-07-15
SIcenterAndProgramSmall01-07-15SIcenterAndProgramSmall01-07-15
SIcenterAndProgramSmall01-07-15
 
Cfop remessa para armazenagem
Cfop remessa para armazenagemCfop remessa para armazenagem
Cfop remessa para armazenagem
 
La informacion angiie
La informacion angiieLa informacion angiie
La informacion angiie
 
Bahagi pecahan
Bahagi pecahanBahagi pecahan
Bahagi pecahan
 
Certificate_3
Certificate_3Certificate_3
Certificate_3
 
Hdp chamba mayra
Hdp chamba mayraHdp chamba mayra
Hdp chamba mayra
 
Reglamento general de la UNEFA
Reglamento general de la UNEFAReglamento general de la UNEFA
Reglamento general de la UNEFA
 
General Description Detail Groto
General Description Detail GrotoGeneral Description Detail Groto
General Description Detail Groto
 
Presentación Sandra Jaramilli y Aba Bernardi - eModa Day Buenos Aires 2015
Presentación Sandra Jaramilli y Aba Bernardi - eModa Day Buenos Aires 2015Presentación Sandra Jaramilli y Aba Bernardi - eModa Day Buenos Aires 2015
Presentación Sandra Jaramilli y Aba Bernardi - eModa Day Buenos Aires 2015
 

Similar to 5 Components of Compliant Backups

eFolder Partner Chat Webinar — Spring Cleaning: Getting Your Clients to Ditch...
eFolder Partner Chat Webinar — Spring Cleaning: Getting Your Clients to Ditch...eFolder Partner Chat Webinar — Spring Cleaning: Getting Your Clients to Ditch...
eFolder Partner Chat Webinar — Spring Cleaning: Getting Your Clients to Ditch...
eFolder
 
File Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesFile Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial Services
BlackBerry
 
iOS Application Security Testing
iOS Application Security TestingiOS Application Security Testing
iOS Application Security Testing
Blueinfy Solutions
 
#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod
Garet Keller
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
JMS Secure Data
 
eFolder Partner Chat Webinar — Making the Case for BDR: Communicating the Val...
eFolder Partner Chat Webinar — Making the Case for BDR: Communicating the Val...eFolder Partner Chat Webinar — Making the Case for BDR: Communicating the Val...
eFolder Partner Chat Webinar — Making the Case for BDR: Communicating the Val...
eFolder
 
Security issues in cloud database
Security  issues  in cloud   database Security  issues  in cloud   database
Security issues in cloud database
أحلام انصارى
 
10 questions to ask your cloud provider
10 questions to ask your cloud provider10 questions to ask your cloud provider
10 questions to ask your cloud provider
HighQ
 
Pcishrinktofitpresentation 151125162550-lva1-app6891
Pcishrinktofitpresentation 151125162550-lva1-app6891Pcishrinktofitpresentation 151125162550-lva1-app6891
Pcishrinktofitpresentation 151125162550-lva1-app6891
Risk Crew
 
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Precisely
 
Secure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationSecure Channels Financal Institution Presentation
Secure Channels Financal Institution Presentation
Richard Blech
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Precisely
 
Datasheet: Security
Datasheet: SecurityDatasheet: Security
Datasheet: Security
VoIPstudio
 
Cloud computing web 2.0 By Joanna Hendricks BMT 580
Cloud computing web 2.0  By Joanna Hendricks BMT 580Cloud computing web 2.0  By Joanna Hendricks BMT 580
Cloud computing web 2.0 By Joanna Hendricks BMT 580
Joanna Hendricks
 
VeeamOn Session Five Compelling Reasons to Add Cloud Backup and DR to your V...
VeeamOn Session  Five Compelling Reasons to Add Cloud Backup and DR to your V...VeeamOn Session  Five Compelling Reasons to Add Cloud Backup and DR to your V...
VeeamOn Session Five Compelling Reasons to Add Cloud Backup and DR to your V...
Dropbox
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
VMUG IT
 
Trustworthy Records Retention
Trustworthy Records Retention Trustworthy Records Retention
Trustworthy Records Retention
Arwa
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloud
Erik Von Schlehenried
 
Rapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdfRapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdf
Tony Pearson
 
EMC Data Domain Retention Lock Software: Detailed Review
EMC Data Domain Retention Lock Software: Detailed ReviewEMC Data Domain Retention Lock Software: Detailed Review
EMC Data Domain Retention Lock Software: Detailed Review
EMC
 

Similar to 5 Components of Compliant Backups (20)

eFolder Partner Chat Webinar — Spring Cleaning: Getting Your Clients to Ditch...
eFolder Partner Chat Webinar — Spring Cleaning: Getting Your Clients to Ditch...eFolder Partner Chat Webinar — Spring Cleaning: Getting Your Clients to Ditch...
eFolder Partner Chat Webinar — Spring Cleaning: Getting Your Clients to Ditch...
 
File Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesFile Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial Services
 
iOS Application Security Testing
iOS Application Security TestingiOS Application Security Testing
iOS Application Security Testing
 
#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
eFolder Partner Chat Webinar — Making the Case for BDR: Communicating the Val...
eFolder Partner Chat Webinar — Making the Case for BDR: Communicating the Val...eFolder Partner Chat Webinar — Making the Case for BDR: Communicating the Val...
eFolder Partner Chat Webinar — Making the Case for BDR: Communicating the Val...
 
Security issues in cloud database
Security  issues  in cloud   database Security  issues  in cloud   database
Security issues in cloud database
 
10 questions to ask your cloud provider
10 questions to ask your cloud provider10 questions to ask your cloud provider
10 questions to ask your cloud provider
 
Pcishrinktofitpresentation 151125162550-lva1-app6891
Pcishrinktofitpresentation 151125162550-lva1-app6891Pcishrinktofitpresentation 151125162550-lva1-app6891
Pcishrinktofitpresentation 151125162550-lva1-app6891
 
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
 
Secure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationSecure Channels Financal Institution Presentation
Secure Channels Financal Institution Presentation
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
 
Datasheet: Security
Datasheet: SecurityDatasheet: Security
Datasheet: Security
 
Cloud computing web 2.0 By Joanna Hendricks BMT 580
Cloud computing web 2.0  By Joanna Hendricks BMT 580Cloud computing web 2.0  By Joanna Hendricks BMT 580
Cloud computing web 2.0 By Joanna Hendricks BMT 580
 
VeeamOn Session Five Compelling Reasons to Add Cloud Backup and DR to your V...
VeeamOn Session  Five Compelling Reasons to Add Cloud Backup and DR to your V...VeeamOn Session  Five Compelling Reasons to Add Cloud Backup and DR to your V...
VeeamOn Session Five Compelling Reasons to Add Cloud Backup and DR to your V...
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
 
Trustworthy Records Retention
Trustworthy Records Retention Trustworthy Records Retention
Trustworthy Records Retention
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloud
 
Rapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdfRapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdf
 
EMC Data Domain Retention Lock Software: Detailed Review
EMC Data Domain Retention Lock Software: Detailed ReviewEMC Data Domain Retention Lock Software: Detailed Review
EMC Data Domain Retention Lock Software: Detailed Review
 

Recently uploaded

GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 

Recently uploaded (20)

GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 

5 Components of Compliant Backups

  • 1. The 5 Components of Compliant Backups for Financial Services Firms www.bumi.com
  • 2. Component #1: Security & Encryption www.bumi.com
  • 3. Component #1: Security & Encryption Does the provider have the following: 1.Military grade AES encryption technology up to 256 bit. FIPS 140-2 certification. 2.LAN security policies that allows data to only be accessed by those with administrative rights. 3.User authentication and role-based access www.bumi.com
  • 4. Component #1: Security & Encryption In addition, you should ask: 1.Is the data both transmitted and stored in encrypted and compressed format? 2.Is there a Client/Server authentication protocol to ensure that no one can restore your data to alternate hardware without authorization? www.bumi.com
  • 5. Component #2: Tamper-Proof Storage www.bumi.com
  • 6. Component #2: Tamper-Proof Storage Is the data stored in a tamper-proof, non-erasable and encrypted format? WORM (Write Once, Read Many) devices used to be the standard. But as optical media became too expensive, the rules were changed to allow software solutions that encrypt the data and keep it from being tampered with. www.bumi.com
  • 7. Component #3: Audit Trail www.bumi.com
  • 8. Component #3: Audit Trail Does the solution provide: 1. An audit trail of all backups and restores? 2. What about destruction certificates of deleted data? 3. Serialized originals and, if applicable, duplicate units of storage media with a time-date record? www.bumi.com
  • 9. Component #4: Archive and Retention Rules www.bumi.com
  • 10. Component #4: Archive and Retention Rules There’s this magical #7 out there… Everyone thinks they need to keep their data for 7 years. The truth is that the rules vary, so it’s important to have highly customizable archive and retention rules configured based on specific business needs. www.bumi.com
  • 11. Component #5: 24/7 Availability www.bumi.com
  • 12. Component #5: 24/7 Availability Be sure the solution provides 24x7 availability of encrypted data for examination by representatives of regulatory bodies and for emergency restores. www.bumi.com
  • 13. BUMI Background • BUMI is a premium provider specializing in online data backup and recovery services • Focused on professional services market • Privately owned and self-funded (debt free and profitable) • Founded in 2002 • Headquartered in New York City with two leased SSAE-16 Type I & II data centers located in Canada www.bumi.com
  • 14. For more information, visit: http://bumi.com/customers/financial-services/ sales@bumi.com 212.599.7800 90 Broad Street, FL 6 New York, NY 10004 www.bumi.com

Editor's Notes

  1. KendraA common compliance mandate (one we’ve seen with HIPAA and SEC 174a) requires organizations to store a copy of their information with at least one offsite third party.Before embarking on this type of relationship with a third-party backup provider, there are several crucial components you must under consideration to avoid headache and ensure a smooth execution and optimal performance in the long-run.
  2. Does the solution provide an audit trail of all backups and restores?What about destruction certificates of deleted data?Serialized originals and, if applicable, duplicate units of storage media with a time-date record?
  3. There’s this magical # out there: 7Everyone thinks they need to keep their data for 7 years.The truth is that the rules vary, so it’s important to have highly customizable archive and retention rules configured based on specific business needs.It’s important to retain data for the specified amount of time, and you don’t want to get caught keeping data too long.
  4. There’s this magical # out there: 7Everyone thinks they need to keep their data for 7 years.The truth is that the rules vary, so it’s important to have highly customizable archive and retention rules configured based on specific business needs.It’s important to retain data for the specified amount of time, and you don’t want to get caught keeping data too long.
  5. 24x7 availability of encrypted data for examination by representatives of regulatory bodies and for emergency restores.