SlideShare a Scribd company logo
1 of 7
Why Agentless 
Backup Is More 
Secure
Why Agentless Backup is More Secure 
 Problems with agents for data backup 
 How agentless backup improves data security 
 9 benefits of agentless backup 
Why Agentless Backup 2 Is More Secure
Problems with Agents 
 Compromised security 
 Creates vulnerability in the server architecture 
 A port in the firewall must be opened for every agent 
 No in-flight encryption 
 Increases complexity 
 Need to buy additional agents when you add servers, applications 
and/or databases to your environment 
 Must upgrade all agents each time there is a hot fix or new 
version of the agent software 
 Undermines the certainty of data recoverability 
 Exorbitant licensing fees 
 Increasing administrative costs 
 Application disruptive 
 Creates “agent pollution” 
Why Agentless Backup 3 Is More Secure
Agentless Backup = Maximum Security 
 Agentless architecture provides: 
 AES 256-bit in-flight and at-rest data encryption 
 Government-approved NIST FIPS 140-2 security certification 
 Customer-controlled encryption key and authentication 
 Regulatory Compliance (SOX, HIPAA, Basel II) 
 Compliant Data Destruction 
Why Agentless Backup 4 Is More Secure 
 Agentless backup helps organizations: 
 Achieve compliance 
 Minimize information-loss liabilities 
 Establish data recovery confidence
9 Benefits of Agentless Backup 
1. Significant cost savings 
 Eliminates unnecessary server maintenance and operating costs 
2. Simple licensing 
 Pay only for compressed storage capacity consumed 
 Multi-site license 
 Add servers, applications and/or databases on the fly 
3. Single consolidated repository 
 One piece of software to install, manage and diagnose 
 Single pane-of-glass view 
 Zero touch silent upgrades 
4. Support for private, hybrid and public cloud 
 Pick the cloud architecture / deployment model that suits your needs 
 Easily migrate as your requirements evolve 
Why Agentless Backup 5 Is More Secure
9 Benefits of Agentless Backup 
5. WAN/LAN/CPU resource conservation 
 Negligible impact on servers, workstations and laptops 
 Data reduction technologies minimize the impact on bandwidth and storage resources 
6. Elegant scaling 
 Easily accommodates new capacity, applications and sites 
 Includes integrated load balancing 
7. Backup consistency, improved recoverability 
 Remote sites can easily implement and maintain consistent backup programs 
8. Autonomic healing 
 Verifies the logical and physical integrity of the data written to the storage systems 
9. Restore Validation 
 Ensures data is recoverable by simulating real recoveries 
Why Agentless Backup 6 Is More Secure
Recovery is Everything™ 
416-736-8111 
Why Agentless Backup 7 Is More Secure 
www.asigra.com 
info@asigra.com 
@asigra 
Questions?

More Related Content

What's hot

Virtualization and IT Challenges
Virtualization and IT ChallengesVirtualization and IT Challenges
Virtualization and IT ChallengesICE Solution
 
Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6Sarah Isaacs
 
Cisco social media content 01
Cisco social media content 01Cisco social media content 01
Cisco social media content 01MonicaEscobar55
 
ePlus Managed Video Services
ePlus Managed Video ServicesePlus Managed Video Services
ePlus Managed Video ServicesePlus
 
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...Qualys
 
10 tips for hardening your system
10 tips for hardening your system10 tips for hardening your system
10 tips for hardening your systemRevital Lapidot
 
HPE Infosight: introduction & demo
HPE Infosight: introduction & demoHPE Infosight: introduction & demo
HPE Infosight: introduction & demoXylos
 
Introducing Acronis Backup as a Service
Introducing Acronis Backup as a ServiceIntroducing Acronis Backup as a Service
Introducing Acronis Backup as a ServiceIngram Micro Cloud
 
HPE InfoSight for Servers
HPE InfoSight for ServersHPE InfoSight for Servers
HPE InfoSight for ServersXylos
 
I C S J W G San Antonio
I C S J W G  San  AntonioI C S J W G  San  Antonio
I C S J W G San AntonioDigital Bond
 
Benefits of VMware Monitoring Tools
Benefits of VMware Monitoring ToolsBenefits of VMware Monitoring Tools
Benefits of VMware Monitoring Toolstiresomerat7000
 
Chef Automating Everything-AWS-PubSec-SAO-WashDC_2018
Chef Automating Everything-AWS-PubSec-SAO-WashDC_2018Chef Automating Everything-AWS-PubSec-SAO-WashDC_2018
Chef Automating Everything-AWS-PubSec-SAO-WashDC_2018Larry Eichenbaum
 
Radiss Managed Services
Radiss Managed ServicesRadiss Managed Services
Radiss Managed Serviceskesavars
 
Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time AlgoSec
 
The 7 Rules of IT Disaster Recovery by Acronis
The 7 Rules of IT Disaster Recovery by AcronisThe 7 Rules of IT Disaster Recovery by Acronis
The 7 Rules of IT Disaster Recovery by AcronisAcronis
 
Protect4S - Seguridad total en sus sistemas SAP
Protect4S - Seguridad total en sus sistemas SAPProtect4S - Seguridad total en sus sistemas SAP
Protect4S - Seguridad total en sus sistemas SAPTomas Martinez
 
AWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - IntelAWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - IntelAmazon Web Services
 
Democratizing Insecurity: Bringing security weaknesses to the tech masses, by...
Democratizing Insecurity: Bringing security weaknesses to the tech masses, by...Democratizing Insecurity: Bringing security weaknesses to the tech masses, by...
Democratizing Insecurity: Bringing security weaknesses to the tech masses, by...APNIC
 

What's hot (20)

Virtualization and IT Challenges
Virtualization and IT ChallengesVirtualization and IT Challenges
Virtualization and IT Challenges
 
Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6
 
Cisco social media content 01
Cisco social media content 01Cisco social media content 01
Cisco social media content 01
 
ePlus Managed Video Services
ePlus Managed Video ServicesePlus Managed Video Services
ePlus Managed Video Services
 
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
 
10 tips for hardening your system
10 tips for hardening your system10 tips for hardening your system
10 tips for hardening your system
 
HPE Infosight: introduction & demo
HPE Infosight: introduction & demoHPE Infosight: introduction & demo
HPE Infosight: introduction & demo
 
Introducing Acronis Backup as a Service
Introducing Acronis Backup as a ServiceIntroducing Acronis Backup as a Service
Introducing Acronis Backup as a Service
 
Vmworld 2005-sln241
Vmworld 2005-sln241Vmworld 2005-sln241
Vmworld 2005-sln241
 
HPE InfoSight for Servers
HPE InfoSight for ServersHPE InfoSight for Servers
HPE InfoSight for Servers
 
I C S J W G San Antonio
I C S J W G  San  AntonioI C S J W G  San  Antonio
I C S J W G San Antonio
 
Benefits of VMware Monitoring Tools
Benefits of VMware Monitoring ToolsBenefits of VMware Monitoring Tools
Benefits of VMware Monitoring Tools
 
Chef Automating Everything-AWS-PubSec-SAO-WashDC_2018
Chef Automating Everything-AWS-PubSec-SAO-WashDC_2018Chef Automating Everything-AWS-PubSec-SAO-WashDC_2018
Chef Automating Everything-AWS-PubSec-SAO-WashDC_2018
 
Radiss Managed Services
Radiss Managed ServicesRadiss Managed Services
Radiss Managed Services
 
DevOps for Database Solution
DevOps for Database SolutionDevOps for Database Solution
DevOps for Database Solution
 
Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time
 
The 7 Rules of IT Disaster Recovery by Acronis
The 7 Rules of IT Disaster Recovery by AcronisThe 7 Rules of IT Disaster Recovery by Acronis
The 7 Rules of IT Disaster Recovery by Acronis
 
Protect4S - Seguridad total en sus sistemas SAP
Protect4S - Seguridad total en sus sistemas SAPProtect4S - Seguridad total en sus sistemas SAP
Protect4S - Seguridad total en sus sistemas SAP
 
AWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - IntelAWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - Intel
 
Democratizing Insecurity: Bringing security weaknesses to the tech masses, by...
Democratizing Insecurity: Bringing security weaknesses to the tech masses, by...Democratizing Insecurity: Bringing security weaknesses to the tech masses, by...
Democratizing Insecurity: Bringing security weaknesses to the tech masses, by...
 

Viewers also liked

5 Pitfalls of Agent Based Solutions
5 Pitfalls of Agent Based Solutions5 Pitfalls of Agent Based Solutions
5 Pitfalls of Agent Based SolutionsAsigra
 
Asigra Cloud-to-Cloud Survey Results
Asigra Cloud-to-Cloud Survey ResultsAsigra Cloud-to-Cloud Survey Results
Asigra Cloud-to-Cloud Survey ResultsAsigra
 
Asigra AWS Snapshot Manager
Asigra AWS Snapshot ManagerAsigra AWS Snapshot Manager
Asigra AWS Snapshot ManagerAsigra
 
7 Reasons Users pick Asigra as Top Enterprise Backup Application
7 Reasons Users pick Asigra as Top Enterprise Backup Application7 Reasons Users pick Asigra as Top Enterprise Backup Application
7 Reasons Users pick Asigra as Top Enterprise Backup ApplicationAsigra
 
5 Backup Industry Predictions for 2015
5 Backup Industry Predictions for 20155 Backup Industry Predictions for 2015
5 Backup Industry Predictions for 2015Asigra
 
4 Keys of a Robust Data Recovery Strategy
4 Keys of a Robust Data Recovery Strategy 4 Keys of a Robust Data Recovery Strategy
4 Keys of a Robust Data Recovery Strategy Asigra
 

Viewers also liked (6)

5 Pitfalls of Agent Based Solutions
5 Pitfalls of Agent Based Solutions5 Pitfalls of Agent Based Solutions
5 Pitfalls of Agent Based Solutions
 
Asigra Cloud-to-Cloud Survey Results
Asigra Cloud-to-Cloud Survey ResultsAsigra Cloud-to-Cloud Survey Results
Asigra Cloud-to-Cloud Survey Results
 
Asigra AWS Snapshot Manager
Asigra AWS Snapshot ManagerAsigra AWS Snapshot Manager
Asigra AWS Snapshot Manager
 
7 Reasons Users pick Asigra as Top Enterprise Backup Application
7 Reasons Users pick Asigra as Top Enterprise Backup Application7 Reasons Users pick Asigra as Top Enterprise Backup Application
7 Reasons Users pick Asigra as Top Enterprise Backup Application
 
5 Backup Industry Predictions for 2015
5 Backup Industry Predictions for 20155 Backup Industry Predictions for 2015
5 Backup Industry Predictions for 2015
 
4 Keys of a Robust Data Recovery Strategy
4 Keys of a Robust Data Recovery Strategy 4 Keys of a Robust Data Recovery Strategy
4 Keys of a Robust Data Recovery Strategy
 

Similar to Why Agentless Backup is More Secure

Hosted Revolution Online Backup V2 001
Hosted Revolution Online Backup V2 001Hosted Revolution Online Backup V2 001
Hosted Revolution Online Backup V2 001Steve Crawford
 
Delivering Modern Data Protection for VMware Environments
Delivering Modern Data Protection for VMware EnvironmentsDelivering Modern Data Protection for VMware Environments
Delivering Modern Data Protection for VMware EnvironmentsPaula Koziol
 
Why Security Teams should care about VMware
Why Security Teams should care about VMwareWhy Security Teams should care about VMware
Why Security Teams should care about VMwareJJDiGeronimo
 
Improved Efficiency through Workload Optimisation
Improved Efficiency through Workload OptimisationImproved Efficiency through Workload Optimisation
Improved Efficiency through Workload Optimisationianmasters
 
Webinar: The Three Reasons Cloud Backup is Broken and How to Fix It
Webinar: The Three Reasons Cloud Backup is Broken and How to Fix ItWebinar: The Three Reasons Cloud Backup is Broken and How to Fix It
Webinar: The Three Reasons Cloud Backup is Broken and How to Fix ItStorage Switzerland
 
Many-to-One Replication for IBM ProtecTIER Deduplication Solutions
Many-to-One Replication for IBM ProtecTIER Deduplication SolutionsMany-to-One Replication for IBM ProtecTIER Deduplication Solutions
Many-to-One Replication for IBM ProtecTIER Deduplication SolutionsIBM India Smarter Computing
 
Cloud Storage: Enabling The Dynamic Datacenter
Cloud Storage: Enabling The Dynamic DatacenterCloud Storage: Enabling The Dynamic Datacenter
Cloud Storage: Enabling The Dynamic DatacenterEntel
 
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)Robb Boyd
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalQuek Lilian
 
University Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical DataUniversity Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical DataNasser Hassan
 
Top 10 Virtualization Initiatives
Top 10 Virtualization InitiativesTop 10 Virtualization Initiatives
Top 10 Virtualization InitiativesSalesQuest
 
Microsoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son VuMicrosoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son Vuvncson
 
Financialservicessolutions
FinancialservicessolutionsFinancialservicessolutions
Financialservicessolutionsirvin1969
 
VMworld Revisited; VMware View & vSphere 4.1
VMworld Revisited; VMware View & vSphere 4.1VMworld Revisited; VMware View & vSphere 4.1
VMworld Revisited; VMware View & vSphere 4.1Paul O'Doherty
 
7 Benefits of Agentless Backup
7 Benefits of Agentless Backup 7 Benefits of Agentless Backup
7 Benefits of Agentless Backup Asigra
 
VM Ware Market Analysis
VM Ware Market AnalysisVM Ware Market Analysis
VM Ware Market Analysisrajatricky
 
Tech Talk Oct 2008 Upgrade Migrate
Tech Talk Oct 2008 Upgrade MigrateTech Talk Oct 2008 Upgrade Migrate
Tech Talk Oct 2008 Upgrade Migratecrmachado
 

Similar to Why Agentless Backup is More Secure (20)

Hosted Revolution Online Backup V2 001
Hosted Revolution Online Backup V2 001Hosted Revolution Online Backup V2 001
Hosted Revolution Online Backup V2 001
 
Delivering Modern Data Protection for VMware Environments
Delivering Modern Data Protection for VMware EnvironmentsDelivering Modern Data Protection for VMware Environments
Delivering Modern Data Protection for VMware Environments
 
Why Security Teams should care about VMware
Why Security Teams should care about VMwareWhy Security Teams should care about VMware
Why Security Teams should care about VMware
 
Icomm agentless-architecture
Icomm agentless-architectureIcomm agentless-architecture
Icomm agentless-architecture
 
Improved Efficiency through Workload Optimisation
Improved Efficiency through Workload OptimisationImproved Efficiency through Workload Optimisation
Improved Efficiency through Workload Optimisation
 
On premise vs cloud server
On premise vs cloud serverOn premise vs cloud server
On premise vs cloud server
 
Webinar: The Three Reasons Cloud Backup is Broken and How to Fix It
Webinar: The Three Reasons Cloud Backup is Broken and How to Fix ItWebinar: The Three Reasons Cloud Backup is Broken and How to Fix It
Webinar: The Three Reasons Cloud Backup is Broken and How to Fix It
 
Many-to-One Replication for IBM ProtecTIER Deduplication Solutions
Many-to-One Replication for IBM ProtecTIER Deduplication SolutionsMany-to-One Replication for IBM ProtecTIER Deduplication Solutions
Many-to-One Replication for IBM ProtecTIER Deduplication Solutions
 
Cloud Storage: Enabling The Dynamic Datacenter
Cloud Storage: Enabling The Dynamic DatacenterCloud Storage: Enabling The Dynamic Datacenter
Cloud Storage: Enabling The Dynamic Datacenter
 
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
University Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical DataUniversity Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical Data
 
Top 10 Virtualization Initiatives
Top 10 Virtualization InitiativesTop 10 Virtualization Initiatives
Top 10 Virtualization Initiatives
 
Microsoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son VuMicrosoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son Vu
 
Financialservicessolutions
FinancialservicessolutionsFinancialservicessolutions
Financialservicessolutions
 
VMworld Revisited; VMware View & vSphere 4.1
VMworld Revisited; VMware View & vSphere 4.1VMworld Revisited; VMware View & vSphere 4.1
VMworld Revisited; VMware View & vSphere 4.1
 
7 Benefits of Agentless Backup
7 Benefits of Agentless Backup 7 Benefits of Agentless Backup
7 Benefits of Agentless Backup
 
VM Ware Market Analysis
VM Ware Market AnalysisVM Ware Market Analysis
VM Ware Market Analysis
 
Tech Talk Oct 2008 Upgrade Migrate
Tech Talk Oct 2008 Upgrade MigrateTech Talk Oct 2008 Upgrade Migrate
Tech Talk Oct 2008 Upgrade Migrate
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 

Why Agentless Backup is More Secure

  • 1. Why Agentless Backup Is More Secure
  • 2. Why Agentless Backup is More Secure  Problems with agents for data backup  How agentless backup improves data security  9 benefits of agentless backup Why Agentless Backup 2 Is More Secure
  • 3. Problems with Agents  Compromised security  Creates vulnerability in the server architecture  A port in the firewall must be opened for every agent  No in-flight encryption  Increases complexity  Need to buy additional agents when you add servers, applications and/or databases to your environment  Must upgrade all agents each time there is a hot fix or new version of the agent software  Undermines the certainty of data recoverability  Exorbitant licensing fees  Increasing administrative costs  Application disruptive  Creates “agent pollution” Why Agentless Backup 3 Is More Secure
  • 4. Agentless Backup = Maximum Security  Agentless architecture provides:  AES 256-bit in-flight and at-rest data encryption  Government-approved NIST FIPS 140-2 security certification  Customer-controlled encryption key and authentication  Regulatory Compliance (SOX, HIPAA, Basel II)  Compliant Data Destruction Why Agentless Backup 4 Is More Secure  Agentless backup helps organizations:  Achieve compliance  Minimize information-loss liabilities  Establish data recovery confidence
  • 5. 9 Benefits of Agentless Backup 1. Significant cost savings  Eliminates unnecessary server maintenance and operating costs 2. Simple licensing  Pay only for compressed storage capacity consumed  Multi-site license  Add servers, applications and/or databases on the fly 3. Single consolidated repository  One piece of software to install, manage and diagnose  Single pane-of-glass view  Zero touch silent upgrades 4. Support for private, hybrid and public cloud  Pick the cloud architecture / deployment model that suits your needs  Easily migrate as your requirements evolve Why Agentless Backup 5 Is More Secure
  • 6. 9 Benefits of Agentless Backup 5. WAN/LAN/CPU resource conservation  Negligible impact on servers, workstations and laptops  Data reduction technologies minimize the impact on bandwidth and storage resources 6. Elegant scaling  Easily accommodates new capacity, applications and sites  Includes integrated load balancing 7. Backup consistency, improved recoverability  Remote sites can easily implement and maintain consistent backup programs 8. Autonomic healing  Verifies the logical and physical integrity of the data written to the storage systems 9. Restore Validation  Ensures data is recoverable by simulating real recoveries Why Agentless Backup 6 Is More Secure
  • 7. Recovery is Everything™ 416-736-8111 Why Agentless Backup 7 Is More Secure www.asigra.com info@asigra.com @asigra Questions?