SlideShare a Scribd company logo
Make The Upgrade: Data
Protection in the Cloud
0027 (0)11 568 2365
www.raxsonic.co.za
info@raxsonic.co.za
Erik Von Schlehenried
This solution is classified under Gartner’s “Cool Vendor” List in 2015
About Us
We have been working in the SMME space since 2004, we have
tried and tested our global partners system in our own
environment over the last 2 years before incorporating into a
working solution for you.
Our core services include:
• Backup and recovery for file servers, email servers, application servers, database servers
• Endpoint backup and recovery for desktops, laptops, and mobile devices
• Long-term data archive through high volume cloud storage with robust retention and replication
• Complete Disaster Recovery for business continuity
• File Sharing and Collaboration with web app, desktop sync, and mobile app
2
Data is Growing at a Rapid Rate
3
DATA GROWTH IS ON EVERYONE’S MIND.
IS IT ON YOURS?
48%of Enterprises ranked data
growth in their top three
challenges*.
*According to Gartner 2010 survey
80%of IT security practitioners say
laptops and mobile devices
pose a significant security risk
to their network because they
are not secure*.
*According to 2013 Ponemon Institute State
of the Endpoint Report
Risks of Unprotected Data: Mobile Devices
4
The protection of data on mobile phones, tablets and
laptops is growing increasingly important due to adoption
and frequent loss or theft.
of employees store work
email passwords on their
personal mobile devices.
35%48%48%35%of employees store work
email passwords on their
personal mobile devices.
67%of people use personal
devices, such as mobile
phones or tablets, to access
corporate data.
Risks of Unprotected Data: A Disaster Strike
5
of employees store work
email passwords on their
personal mobile devices.
35%48%48%10%of companies without a
disaster recovery plan
survive.
70%of businesses have
experienced data loss due to a
natural disaster, human error
or equipment failure.
When a data disaster strikes, most businesses without a
disaster recovery plan will not survive.
Risks of Unprotected Data: File Sharing
6
of employees store work
email passwords on their
personal mobile devices.
35%48%48%55%of workers use a free file
sharing service but don’t
tell their IT department.
84%of finance departments report
using free file sharing to share
company financials.
50% of companies have blacklisted use of free file-sharing.
Have you?
7
Complete Data Protection Coverage
Without one or more of these elements, data is at risk.
Key
Takeaway
• Multiple locations to protect and backup
• No backup system in place
• Aging servers and multiple operating systems
• A need to protect company data on a growing number of mobile devices
• A limited budget; no CAPEX funds available
• A need for a solution that can grow with your business, yet won’t break
the bank
8
Data Protection Challenges
It’s a complex world and difficult to protect rapidly growing
amounts of data. You may have:
The ONLY All-in-one Data Protection Platform
9
SUPPORTED OPERATING SYSTEMS
Advanced Cloud Backup Features
• Available for file or application servers in a virtual
or physical environment
• Includes SharePoint, SQL, Windows server and
Exchange backups
• Bare metal image backups provide complete
recovery of server environment and minimal
downtime
10
Server Backup
Complete backup and recovery for servers and applications, virtual or physical.
Advanced Cloud Endpoint Backup Features
• Protects business critical data on smartphones,
tablets or laptops
• Military grade, three-tier encryption process
protects data being shared
• Remote wipe, heterogenous data restore and
geo-tracking prevent data loss
• Puts you back in control of your company’s data
11
Endpoint Backup
Safeguard your company’s data everywhere it lives.
Advanced Cloud Archive Features
12
Archive
Save valuable, local storage space by archiving to the cloud.
• Ideal when data has to be stored for a defined
period of time to comply with industry
regulations
• Make room for new data to be stored locally by
moving aging data to the cloud
Advanced Cloud File Sharing Features
• Allow employees to preview, share and edit files
in a secure environment
• Use desktop application to sync with any
computer
• Web or mobile application available anytime,
anywhere
13
File Sharing
Enable your employees to safely preview, edit and share files and folders in the
cloud.
Advanced Cloud Disaster Recovery Features
• Available for VMWare, Linux, Unix and Windows
environments
• Quickly recover data from one or multiple sites
• Deployable on your own server or with our
cloud-connected appliance available as HaaS
(Hardware as a Service)
14
Disaster Recovery
Be prepared, recover business critical data and ensure limited downtime.
15
• Private Cloud: Your on-premise, private cloud
• Public Cloud: Host data in our secure, public cloud
• Hybrid Cloud: A combination of public & private clouds
• Cloud-Connected Appliance: Available as virtual or physical server
Host Anywhere You Need
16
• Ideal for any size business from a Sole Proprietor to any
Multi-National / International organisation, from 1 Gigabyte
upwards
• Affordable and available as HaaS (Hardware as a Service)
• No need to perform upgrades or maintain hardware
• Supports fast RTO (Recovery Time Objective) for minimal
downtime
• Scales with you as you grow: easily add storage space as
needed
Why a cloud-connected appliance?
Our Cloud: Safe and Secure
Our data protection solution uses a unique three-tiered encryption
process modeled on the same system used by the U.S. military.
Data is encrypted as follows:
• Locally with system generated key only the end user has access to
• In transit with SSL
• At rest in our Tier 3 & 4 data centers that are monitored 24/7
17
Encryption
Not all cloud-based vendors protect data while it is in transit.
Key
Takeaway
Q & A
Do you want to get your PC, Tablets, Smartphones, Servers…
protected? We are offering limited 14 day free trial under our
platform. Get you free trial going now at
https://www.raxsonic.co.za/billing/cart.php
If you are an IT company wanting to provide your clients with a white
label solution contact us on 011 5682365 or send an email to
info@raxsonic.co.za
If you are an IT manager for an organisation and are looking at, or
want to test our solution contact us on 011 5682365 or send an email
to info@raxsonic.co.za or simply register for a Free trial as above.
18
Questions?

More Related Content

What's hot

Cloud computing | Cloud Tally Services In Pune | PrismIT
Cloud computing | Cloud Tally Services In Pune | PrismITCloud computing | Cloud Tally Services In Pune | PrismIT
Cloud computing | Cloud Tally Services In Pune | PrismIT
PrismITsolutions
 
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesProtecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Druva
 
Are You Protected From Downtime and Data Loss?
Are You Protected From Downtime and Data Loss? Are You Protected From Downtime and Data Loss?
Are You Protected From Downtime and Data Loss?
Lai Yoong Seng
 
Health Decisions Webinar: January 2013 data warehouses
Health Decisions Webinar: January 2013 data warehousesHealth Decisions Webinar: January 2013 data warehouses
Health Decisions Webinar: January 2013 data warehouses
Si Nahra
 
ISV -Microsoft and Veeam Better Together
ISV -Microsoft and Veeam Better TogetherISV -Microsoft and Veeam Better Together
ISV -Microsoft and Veeam Better Together
Lai Yoong Seng
 
IT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIT Service & Asset Management Better Together
IT Service & Asset Management Better Together
Ivanti
 
4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva
Druva
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5damonhough
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
David J Rosenthal
 
Cloud Services & the Development of ISO/IEC 27018
Cloud Services & the Development of ISO/IEC 27018Cloud Services & the Development of ISO/IEC 27018
Cloud Services & the Development of ISO/IEC 27018
Corporacion Colombia Digital
 
7 Ways Backup Makes IT More Productive
7 Ways Backup Makes IT More Productive7 Ways Backup Makes IT More Productive
7 Ways Backup Makes IT More Productive
marketingunitrends
 
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the CloudCut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Druva
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at Edge
Dell EMC World
 
Data Masking With The Delphix Dynamic Data Platform
Data Masking With The Delphix Dynamic Data PlatformData Masking With The Delphix Dynamic Data Platform
Data Masking With The Delphix Dynamic Data Platform
Delphix
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12
Bloombase
 

What's hot (16)

Cloud computing | Cloud Tally Services In Pune | PrismIT
Cloud computing | Cloud Tally Services In Pune | PrismITCloud computing | Cloud Tally Services In Pune | PrismIT
Cloud computing | Cloud Tally Services In Pune | PrismIT
 
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesProtecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
 
Are You Protected From Downtime and Data Loss?
Are You Protected From Downtime and Data Loss? Are You Protected From Downtime and Data Loss?
Are You Protected From Downtime and Data Loss?
 
Health Decisions Webinar: January 2013 data warehouses
Health Decisions Webinar: January 2013 data warehousesHealth Decisions Webinar: January 2013 data warehouses
Health Decisions Webinar: January 2013 data warehouses
 
ISV -Microsoft and Veeam Better Together
ISV -Microsoft and Veeam Better TogetherISV -Microsoft and Veeam Better Together
ISV -Microsoft and Veeam Better Together
 
IT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIT Service & Asset Management Better Together
IT Service & Asset Management Better Together
 
4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
 
DCNCBC
DCNCBCDCNCBC
DCNCBC
 
Cloud Services & the Development of ISO/IEC 27018
Cloud Services & the Development of ISO/IEC 27018Cloud Services & the Development of ISO/IEC 27018
Cloud Services & the Development of ISO/IEC 27018
 
7 Ways Backup Makes IT More Productive
7 Ways Backup Makes IT More Productive7 Ways Backup Makes IT More Productive
7 Ways Backup Makes IT More Productive
 
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the CloudCut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at Edge
 
Data Masking With The Delphix Dynamic Data Platform
Data Masking With The Delphix Dynamic Data PlatformData Masking With The Delphix Dynamic Data Platform
Data Masking With The Delphix Dynamic Data Platform
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12
 

Viewers also liked

wojtekoslowski_portfolio
wojtekoslowski_portfoliowojtekoslowski_portfolio
wojtekoslowski_portfolioWojtek Os?owski
 
educational technology
educational technologyeducational technology
educational technology
Rose Ann Montayre
 
Herbal Sexual Stamina Booster Pills For Men To Improve Lovemaking Performance
Herbal Sexual Stamina Booster Pills For Men To Improve Lovemaking Performance Herbal Sexual Stamina Booster Pills For Men To Improve Lovemaking Performance
Herbal Sexual Stamina Booster Pills For Men To Improve Lovemaking Performance
Aaron E Smith
 

Viewers also liked (7)

Fundable Ideas
Fundable IdeasFundable Ideas
Fundable Ideas
 
wojtekoslowski_portfolio
wojtekoslowski_portfoliowojtekoslowski_portfolio
wojtekoslowski_portfolio
 
Edtech1
Edtech1Edtech1
Edtech1
 
My CV...
My CV...My CV...
My CV...
 
educational technology
educational technologyeducational technology
educational technology
 
Herbal Sexual Stamina Booster Pills For Men To Improve Lovemaking Performance
Herbal Sexual Stamina Booster Pills For Men To Improve Lovemaking Performance Herbal Sexual Stamina Booster Pills For Men To Improve Lovemaking Performance
Herbal Sexual Stamina Booster Pills For Men To Improve Lovemaking Performance
 
My CV...
My CV...My CV...
My CV...
 

Similar to Make the Upgrade: Data protection in the cloud

CT Business Solutions Catalogue
CT Business Solutions CatalogueCT Business Solutions Catalogue
CT Business Solutions CatalogueEnda Folan
 
Webinar: Overcoming The 4 Data Protection Challenges of Hybrid IT
Webinar: Overcoming The 4 Data Protection Challenges of Hybrid ITWebinar: Overcoming The 4 Data Protection Challenges of Hybrid IT
Webinar: Overcoming The 4 Data Protection Challenges of Hybrid IT
Storage Switzerland
 
Webinar: 10 Reasons Why Backup Breaks and How to Fix It
Webinar: 10 Reasons Why Backup Breaks and How to Fix ItWebinar: 10 Reasons Why Backup Breaks and How to Fix It
Webinar: 10 Reasons Why Backup Breaks and How to Fix It
Storage Switzerland
 
[Slides] key considerations to look for in managed services
[Slides] key considerations to look for in managed services[Slides] key considerations to look for in managed services
[Slides] key considerations to look for in managed services
Agusto Sipahutar
 
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Storage Switzerland
 
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
mfrancis
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
IBM Security
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Robert Crane
 
Hortonworks Hybrid Cloud - Putting you back in control of your data
Hortonworks Hybrid Cloud - Putting you back in control of your dataHortonworks Hybrid Cloud - Putting you back in control of your data
Hortonworks Hybrid Cloud - Putting you back in control of your data
Scott Clinton
 
Financial and Operational Results by moving to the Cloud!
Financial and Operational Results by moving to the Cloud! Financial and Operational Results by moving to the Cloud!
Financial and Operational Results by moving to the Cloud! awrightKMBS
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights Management
David J Rosenthal
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
Icomm Technologies
 
Extending The Enterprise With Office 365 & Azure for the Enterprise
Extending The Enterprise With Office 365 & Azure for the EnterpriseExtending The Enterprise With Office 365 & Azure for the Enterprise
Extending The Enterprise With Office 365 & Azure for the EnterpriseRichard Harbridge
 
Your path to the cloud local event presentation
Your path to the cloud   local event presentationYour path to the cloud   local event presentation
Your path to the cloud local event presentation
awrightKMBS
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
Falgun Rathod
 
Four Reasons Why Your Backup & Recovery Hardware will Break by 2020
Four Reasons Why Your Backup & Recovery Hardware will Break by 2020Four Reasons Why Your Backup & Recovery Hardware will Break by 2020
Four Reasons Why Your Backup & Recovery Hardware will Break by 2020
Storage Switzerland
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
Andris Soroka
 
Remote Data Backup Protection
Remote Data Backup ProtectionRemote Data Backup Protection
Remote Data Backup Protection
CrystaLink Inc.
 

Similar to Make the Upgrade: Data protection in the cloud (20)

CT Business Solutions Catalogue
CT Business Solutions CatalogueCT Business Solutions Catalogue
CT Business Solutions Catalogue
 
Webinar: Overcoming The 4 Data Protection Challenges of Hybrid IT
Webinar: Overcoming The 4 Data Protection Challenges of Hybrid ITWebinar: Overcoming The 4 Data Protection Challenges of Hybrid IT
Webinar: Overcoming The 4 Data Protection Challenges of Hybrid IT
 
druva-solution-brochure
druva-solution-brochuredruva-solution-brochure
druva-solution-brochure
 
Webinar: 10 Reasons Why Backup Breaks and How to Fix It
Webinar: 10 Reasons Why Backup Breaks and How to Fix ItWebinar: 10 Reasons Why Backup Breaks and How to Fix It
Webinar: 10 Reasons Why Backup Breaks and How to Fix It
 
Cleversafe.PPTX
Cleversafe.PPTXCleversafe.PPTX
Cleversafe.PPTX
 
[Slides] key considerations to look for in managed services
[Slides] key considerations to look for in managed services[Slides] key considerations to look for in managed services
[Slides] key considerations to look for in managed services
 
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
 
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
Hortonworks Hybrid Cloud - Putting you back in control of your data
Hortonworks Hybrid Cloud - Putting you back in control of your dataHortonworks Hybrid Cloud - Putting you back in control of your data
Hortonworks Hybrid Cloud - Putting you back in control of your data
 
Financial and Operational Results by moving to the Cloud!
Financial and Operational Results by moving to the Cloud! Financial and Operational Results by moving to the Cloud!
Financial and Operational Results by moving to the Cloud!
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights Management
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
Extending The Enterprise With Office 365 & Azure for the Enterprise
Extending The Enterprise With Office 365 & Azure for the EnterpriseExtending The Enterprise With Office 365 & Azure for the Enterprise
Extending The Enterprise With Office 365 & Azure for the Enterprise
 
Your path to the cloud local event presentation
Your path to the cloud   local event presentationYour path to the cloud   local event presentation
Your path to the cloud local event presentation
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Four Reasons Why Your Backup & Recovery Hardware will Break by 2020
Four Reasons Why Your Backup & Recovery Hardware will Break by 2020Four Reasons Why Your Backup & Recovery Hardware will Break by 2020
Four Reasons Why Your Backup & Recovery Hardware will Break by 2020
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
 
Remote Data Backup Protection
Remote Data Backup ProtectionRemote Data Backup Protection
Remote Data Backup Protection
 

Recently uploaded

Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
TravisMalana
 
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
haila53
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Subhajit Sahu
 
一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单
ewymefz
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
jerlynmaetalle
 
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
ewymefz
 
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
axoqas
 
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
AbhimanyuSinha9
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
ahzuo
 
FP Growth Algorithm and its Applications
FP Growth Algorithm and its ApplicationsFP Growth Algorithm and its Applications
FP Growth Algorithm and its Applications
MaleehaSheikh2
 
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
pchutichetpong
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
vcaxypu
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
u86oixdj
 
Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
Subhajit Sahu
 
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project PresentationPredicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Boston Institute of Analytics
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
ewymefz
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
NABLAS株式会社
 
Machine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptxMachine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptx
balafet
 
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
mbawufebxi
 
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
axoqas
 

Recently uploaded (20)

Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
 
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
 
一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
 
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
 
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
 
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
 
FP Growth Algorithm and its Applications
FP Growth Algorithm and its ApplicationsFP Growth Algorithm and its Applications
FP Growth Algorithm and its Applications
 
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
 
Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
 
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project PresentationPredicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
 
Machine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptxMachine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptx
 
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
 
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
 

Make the Upgrade: Data protection in the cloud

  • 1. Make The Upgrade: Data Protection in the Cloud 0027 (0)11 568 2365 www.raxsonic.co.za info@raxsonic.co.za Erik Von Schlehenried This solution is classified under Gartner’s “Cool Vendor” List in 2015
  • 2. About Us We have been working in the SMME space since 2004, we have tried and tested our global partners system in our own environment over the last 2 years before incorporating into a working solution for you. Our core services include: • Backup and recovery for file servers, email servers, application servers, database servers • Endpoint backup and recovery for desktops, laptops, and mobile devices • Long-term data archive through high volume cloud storage with robust retention and replication • Complete Disaster Recovery for business continuity • File Sharing and Collaboration with web app, desktop sync, and mobile app 2
  • 3. Data is Growing at a Rapid Rate 3 DATA GROWTH IS ON EVERYONE’S MIND. IS IT ON YOURS? 48%of Enterprises ranked data growth in their top three challenges*. *According to Gartner 2010 survey 80%of IT security practitioners say laptops and mobile devices pose a significant security risk to their network because they are not secure*. *According to 2013 Ponemon Institute State of the Endpoint Report
  • 4. Risks of Unprotected Data: Mobile Devices 4 The protection of data on mobile phones, tablets and laptops is growing increasingly important due to adoption and frequent loss or theft. of employees store work email passwords on their personal mobile devices. 35%48%48%35%of employees store work email passwords on their personal mobile devices. 67%of people use personal devices, such as mobile phones or tablets, to access corporate data.
  • 5. Risks of Unprotected Data: A Disaster Strike 5 of employees store work email passwords on their personal mobile devices. 35%48%48%10%of companies without a disaster recovery plan survive. 70%of businesses have experienced data loss due to a natural disaster, human error or equipment failure. When a data disaster strikes, most businesses without a disaster recovery plan will not survive.
  • 6. Risks of Unprotected Data: File Sharing 6 of employees store work email passwords on their personal mobile devices. 35%48%48%55%of workers use a free file sharing service but don’t tell their IT department. 84%of finance departments report using free file sharing to share company financials. 50% of companies have blacklisted use of free file-sharing. Have you?
  • 7. 7 Complete Data Protection Coverage Without one or more of these elements, data is at risk. Key Takeaway
  • 8. • Multiple locations to protect and backup • No backup system in place • Aging servers and multiple operating systems • A need to protect company data on a growing number of mobile devices • A limited budget; no CAPEX funds available • A need for a solution that can grow with your business, yet won’t break the bank 8 Data Protection Challenges It’s a complex world and difficult to protect rapidly growing amounts of data. You may have:
  • 9. The ONLY All-in-one Data Protection Platform 9 SUPPORTED OPERATING SYSTEMS
  • 10. Advanced Cloud Backup Features • Available for file or application servers in a virtual or physical environment • Includes SharePoint, SQL, Windows server and Exchange backups • Bare metal image backups provide complete recovery of server environment and minimal downtime 10 Server Backup Complete backup and recovery for servers and applications, virtual or physical.
  • 11. Advanced Cloud Endpoint Backup Features • Protects business critical data on smartphones, tablets or laptops • Military grade, three-tier encryption process protects data being shared • Remote wipe, heterogenous data restore and geo-tracking prevent data loss • Puts you back in control of your company’s data 11 Endpoint Backup Safeguard your company’s data everywhere it lives.
  • 12. Advanced Cloud Archive Features 12 Archive Save valuable, local storage space by archiving to the cloud. • Ideal when data has to be stored for a defined period of time to comply with industry regulations • Make room for new data to be stored locally by moving aging data to the cloud
  • 13. Advanced Cloud File Sharing Features • Allow employees to preview, share and edit files in a secure environment • Use desktop application to sync with any computer • Web or mobile application available anytime, anywhere 13 File Sharing Enable your employees to safely preview, edit and share files and folders in the cloud.
  • 14. Advanced Cloud Disaster Recovery Features • Available for VMWare, Linux, Unix and Windows environments • Quickly recover data from one or multiple sites • Deployable on your own server or with our cloud-connected appliance available as HaaS (Hardware as a Service) 14 Disaster Recovery Be prepared, recover business critical data and ensure limited downtime.
  • 15. 15 • Private Cloud: Your on-premise, private cloud • Public Cloud: Host data in our secure, public cloud • Hybrid Cloud: A combination of public & private clouds • Cloud-Connected Appliance: Available as virtual or physical server Host Anywhere You Need
  • 16. 16 • Ideal for any size business from a Sole Proprietor to any Multi-National / International organisation, from 1 Gigabyte upwards • Affordable and available as HaaS (Hardware as a Service) • No need to perform upgrades or maintain hardware • Supports fast RTO (Recovery Time Objective) for minimal downtime • Scales with you as you grow: easily add storage space as needed Why a cloud-connected appliance?
  • 17. Our Cloud: Safe and Secure Our data protection solution uses a unique three-tiered encryption process modeled on the same system used by the U.S. military. Data is encrypted as follows: • Locally with system generated key only the end user has access to • In transit with SSL • At rest in our Tier 3 & 4 data centers that are monitored 24/7 17 Encryption Not all cloud-based vendors protect data while it is in transit. Key Takeaway
  • 18. Q & A Do you want to get your PC, Tablets, Smartphones, Servers… protected? We are offering limited 14 day free trial under our platform. Get you free trial going now at https://www.raxsonic.co.za/billing/cart.php If you are an IT company wanting to provide your clients with a white label solution contact us on 011 5682365 or send an email to info@raxsonic.co.za If you are an IT manager for an organisation and are looking at, or want to test our solution contact us on 011 5682365 or send an email to info@raxsonic.co.za or simply register for a Free trial as above. 18 Questions?

Editor's Notes

  1. SQL Server 2008, 2008 R2, and 2012 Exchange Server 2010 Exchange Granular Recovery Bare Metal backup for Windows-based machines
  2. SQL Server 2008, 2008 R2, and 2012 Exchange Server 2010 Exchange Granular Recovery Bare Metal backup for Windows-based machines
  3. SQL Server 2008, 2008 R2, and 2012 Exchange Server 2010 Exchange Granular Recovery Bare Metal backup for Windows-based machines
  4. SQL Server 2008, 2008 R2, and 2012 Exchange Server 2010 Exchange Granular Recovery Bare Metal backup for Windows-based machines
  5. SQL Server 2008, 2008 R2, and 2012 Exchange Server 2010 Exchange Granular Recovery Bare Metal backup for Windows-based machines