Managed Backup & Disaster Recovery

Russell Technologies’ backup and disaster recovery service is a robust yet simple solution to ensure that all of the data on the servers at our client’s network is safe. The service includes onsite backups, remote storage, and offers offsite virtual server capabilities in a complete disaster scenario, with 24x7 management of the entire process. This solution is completely automated, with no manual elements to manage for the client’s team.

An extremely important part of this setup is that the backup appliance is completely autonomous from the rest of the client’s network. Where most other backup systems work inside the network, therefore becoming subject to threats that could circulate inside the network. Russell Technologies’ backup appliances:

  • Do not integrate with Active Directory for permissions or passwords
  • Do not have shares available to the network preventing worms that spread using SMB file
    sharing protocol
  • Run on a static IP with outside DNS preventing many network threats that can circulate, and preventing man in the middle attacks against the traffic

The Russell Technologies backup and recovery system:

  • Is a complete solution, designed to reduce any server downtime with the use of a specialized backup and replication engine
  • Allows near-real-time backups – (typically set at one hour) – using block level, VSS, snapshots on Windows based Servers and Desktops (Linux backups can vary based on distribution as well as being physical or virtual)
    o An automated verification process is run as each backup snapshot is written, while a full
    verification of the entire chain is run nightly
    o Monthly, manual test restores are run by Russell Technologies
  • Uses secure, 256-bit, encryption, both at rest, and during replication of backups
  • Provides a speedy disaster recovery process in the event of server failure or data loss event with granular file or folder restores, as well as full system image restores
  • Has long retention periods on backup chains
    o Typical chains can last from three months to two years depending on the activity, applications, and behavior of the server, without needing to archive
    o Archiving of chains is done at no additional cost beyond that of the storage device
  • Encrypts data so that it is not accessible to anyone, either on the unit or at the remote storage facility, without the encryption passkey
Data Storage Explanation

Manage Your Cyber Security Strategy