Story image

BackupAssist announces Version 10 of server backup and recovery software

15 May 2017

Automated Windows server backup and recovery software provider BackupAssist has announced version 10 of their product.

With the availability of version 10, BackupAssist customers will be have the choice of using their preferred public cloud infrastructure for the storage of their backup data.

“BackupAssist 10 brings big enterprise backup to SMEs that is optimised for ease-of-use and reliability,” says IDC protection, availability, and recovery research director Phil Goodwin.

The new software allows customers to cost-effectively leverage existing cloud accounts and infrastructure with their choice of redundancy level and backup vault locations to meet cost, compliance, and performance requirements.

"The data protection and recovery market are forecast to continue growing at a faster pace than overall IT spending,” says Goodwin.

“This means that IT organizations are prioritizing data protection and recovery activities and directing more resources to them.”

“Much of this growth is in the software and cloud segments, which are growing the fastest," Goodwin adds. 

Small and medium enterprises want a choice on where their backup data is saved and replicated to.

With cloud independence, customers can be assured of receiving the maximum data deduplication and compression efficiency because the customer selects the final backup storage location, eliminating backup and storage provider conflicts of interest.

“Because the requirements of SMEs are globally diverse, many customers require a data recovery solution that can be customised to meet their computing needs,” says BackupAssist CEO and co-founder Linus Chang.

Advanced capabilities in version 10 include:

  • Cloud Storage Independence: BackupAssist 10 provides true cloud independence. This design allows the customer to choose where to store backup data - allowing the selection of the most appropriate cloud storage resource. Current options include Amazon AWS S3 and Microsoft Azure. The new feature provides a pay-per-use option and is ideal for customers who do not want to pay for storage space they are not using. Support for additional public and private cloud options will be announced in 2017.
  • Fully Insulated Encryption: Create encrypted backup containers that deliver complete data privacy. Data is encrypted before leaving the customer server for both client-side and end-to-end non-convergent encryption. Utilizing AES-256 encryption, each container is completely independent of each other, even if multiple containers exist on the same cloud account or in multi-tenanted systems. Different encryption keys are used for each container and the cloud provider has zero-knowledge of the content, mitigating the risk of data theft.
  • Nearly Quadruple Data Deduplication and Compression: Reduce bandwidth use and storage space needs when backing up to the cloud. Testing results reveal that in typical customer deployments, new compression and deduplication algorithms provide up to 71% space savings for significant savings on-premises or in the cloud. Unlike competitive solutions which require additional servers to be installed to provide data deduplication, BackupAssist allows administrators to deduplicate data straight to the cloud without additional infrastructure.
  • Advanced application backup and recovery: Protect Hyper-V guests, Exchange Server, SQL Server and more.
Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
Why AI and behaviour analytics should be essential to enterprises
Cyber threats continue to increase in number and severity, prompting cybersecurity experts to seek new ways to stop malicious actors.
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Princeton study wants to know if you have a smart home - or a spy home
The IoT research team at Princeton University wants to know how your IoT devices send and receive data not only to each other, but also to any other third parties that may be involved.
Organisations not testing incident response plans – IBM Security
Failure to test can leave organisations less prepared to effectively manage the complex processes and coordination that must take place in the wake of an attack.
65% of manufacturers run outdated operating systems – Trend Micro
The report highlights the unique triple threat facing manufacturing, including the risks associated with IT, OT and IP.