Disaster Recovery & Business Continuity
Disaster Recovery & Business Continuity ensures business resilience through device and system backups, M365 backups, and a comprehensive disaster recovery solution with cyber recovery capabilities. These services protect critical data and ensure rapid recovery in case of disruptions.
Backup and Disaster Recovery Management
-
Customised Backup Strategy Management for SSG-Supported Services
Collaborate with clients to oversee and adapt backup strategies that align with their evolving business needs.
-
Disaster Recovery Drill Coordination
Schedule and manage regular disaster recovery drills, evaluating the effectiveness of response processes.
-
Data Restoration Facilitation
Provide hands-on support to facilitate data restoration, prioritising critical systems for minimal business impact.
-
Backup Retention Policy Oversight
Manage and enforce retention policies, ensuring data is kept in compliance with business and regulatory mandates.
-
Regular Backup Verification
Perform routine manual checks to verify the integrity and recoverability of backups, providing comprehensive audit reports.
-
RTO/RPO Oversight
Manage and review Recovery Time and Point Objectives, ensuring that recovery solutions remain effective and meet business requirements.
-
Compliance & Audit Support
Prepare documentation and assist clients in meeting compliance requirements related to data backup and disaster recovery.
Device & System Backups
Device and System Backups involve regularly creating secure, encrypted copies of critical data and system configurations. This ensures data can be recovered in the event of hardware failure, cyber-attacks, or accidental deletion, minimizing downtime and data loss.
-
20+ Platforms Protected
Every system—physical, virtual or cloud—and all workloads are consolidated to safeguard data across all platforms. Any new application is integrated seamlessly into your existing environment, delivering continuous and comprehensive data protection.
-
Secure Ransomware Protection
Defend your data with built-in MI-based ransomware protection and blockchain notarization.By placing the human element in the middle of the risk analytics and management strategy, your organization becomes even harder to breach.
-
File and Disk-Image Backup
Backup individual files or safeguard your entire business by backing up the entire system as a single file, ensuring a bare metal restore capability. In the event of data disaster, you can easily restore all information to new hardware.
-
Any-to-Any Migration
Ensure users don’t lose their in-progress work by defining a list of critical apps that are frequently used. The backup agent monitors every change made in the listed applications—no matter where the user saves the file – and continuously backs it up. If the system needs to be reimaged, you can restore the data from a backup and apply the latest changes, so no data is lost.
-
Variable Block-Size Deduplication
Protect more systems while reducing the impact on disk-storage and network capacity by capturing only the blocks with data that has changed since the previous backup. Cyber Backup deduplication minimizes storage space by detecting data repetition and storing the identical data only once.
-
Data Protection Mapping
Ensure that critical data is protected for compliance reporting with a data protection map. Get detailed information about stored data and use the automatic data classification to track the protection status of important files. You will be alerted if files are backed up or not, helping you to further protect your data.
-
Forensic Data Collection
Maintaining compliance and running internal investigations can be an expensive process. With the Forensic Mode built into Cyber Protect, you can simplify future analysis by collecting digital evidence – like memory dumps and process information – from disk-level backups.
-
Quick, reliable recovery
Get fast and reliable recovery of your apps, systems and data on any device, from any incident.
-
Anti-Malware Scanning of Backups
Prevent restoring infected files from backups with built-in malware scanning. By scanning full disk backups at a centralized location, Acronis Cyber Protect can help find malware – ensuring users restore a clean, malware-free backup.
-
Safe Recovery
An OS image or application in a backup that is infected with malware can cause continuous reinfection if it is used for recovery without removing the malware. Removing the detected malware and applying the latest anti-malware definitions during the recovery allows users to restore the OS image safely, reducing the chance of reinfection.
-
Universal Restore
Minimize expensive downtime by restoring Windows and Linux systems to dissimilar hardware, including bare-metal physical, virtual or cloud environments. By overcoming compatibility issues, Universal Restore technology ensures quick and easy system migration with a few clicks.
-
Instant Restore
Reduce recovery times with best-in-industry RTOs by immediately starting your backup as a Windows or Linux virtual machine directly from storage. Have your VM up and running in mere seconds, while Instant Restore technology invisibly moves your data to the host in the background.
-
Drive Health Monitoring
Avoid unpredictable data loss and proactively improve uptime by monitoring drive health. By using machine learning on S.M.A.R.T. reports, and various operating system parameters, Acronis Cyber Protect can alert you about a disk issue before it happens. This enables you to take the precautionary measures needed to protect your data.
-
App Allowlisting Based On Backups Contents
Traditional, global allowlisting does not handle custom applications well. Cyber Protect scans backups with anti-malware technologies (MI, behavioral heuristics, etc.) to allowlist organizationally unique apps and avoid future false positives.
M365 Backups
M365 Backups ensure secure, automated backups of critical data from Microsoft 365 services, including Exchange, SharePoint, OneDrive, and Teams. These backups protect against accidental deletion, ransomware, and data corruption, enabling recovery of emails, files, and other content to maintain business continuity and regulatory compliance.
-
End-to-End Encryption
• AES 256-bit Encryption: Data is encrypted both in transit and at rest using industry-standard AES-256 encryption to ensure that backups are protected from unauthorized access.
• TLS Encryption: All data transfers between Microsoft 365 and Datto’s backup storage use Transport Layer Security (TLS) to protect data while in transit.
-
Role-Based Access Control (RBAC)
• Granular User Permissions: Allows administrators to control who has access to the backup solution and what specific permissions they hold, reducing the risk of unauthorized access to critical backup systems.
-
Data Redundancy
• Geo-Redundant Data Centers: Backups are stored in geographically dispersed data centers, ensuring high availability and protection against data center outages or regional failures.
• High Availability: Multiple copies of backups are maintained to ensure redundancy and failover in case of a disaster or hardware failure.
-
Data Retention Policies
• Customizable Retention Policies: Allows organizations to define how long backups are retained and when they should be purged, ensuring compliance with data retention regulations and minimizing storage costs.
• Automatic Archiving: Historical backups are securely stored for long-term retention based on configured policies, protecting data for future compliance audits or recovery needs.
-
Multi-Factor Authentication (MFA)
Enhanced Login Security: MFA is supported to secure access to the backup management portal, reducing the risk of unauthorized access to backup data or restore functions.
-
Backup Data Isolation
• Logical Separation: Backups are logically isolated from the primary Microsoft 365 environment, reducing the likelihood that a compromise in the production environment will impact backups.
-
Backup Monitoring and Reporting
• Backup Activity Logs: Continuous logging of all backup activities, including creation, deletion, and restoration, providing a clear audit trail for security and compliance.
• Reporting and Insights: Comprehensive reporting tools allow admins to track the backup status, ensuring that all critical data is being protected as expected.
-
Granular Restore and Recovery
• Granular Recovery Options: Ability to recover individual files, folders, emails, or entire mailboxes, allowing minimal disruption during recovery and avoiding exposure of unnecessary data.
• Point-in-Time Recovery: Ensures you can recover specific versions of data, protecting against accidental or malicious deletion or modification.
-
Immutable Backups
• Ransomware-Resistant Backup Storage: Backups stored in Datto’s infrastructure are immutable, meaning they cannot be altered, deleted, or encrypted by ransomware or other malicious attacks.
• Write-Once, Read-Many (WORM): Backup data can only be written once and cannot be modified, providing tamper-resistant backup storage.
-
Compliance and Regulatory Support
• GDPR, HIPAA, and SOC Compliance: Datto’s backup solution is compliant with key industry regulations such as GDPR, HIPAA, and SOC 2, ensuring that backup procedures and storage meet high security and privacy standards.
• Audit Logs: Detailed logs of backup operations, user actions, and restores are maintained for auditing and compliance purposes.
-
Automated Backup Verification
• Automated Integrity Checks: Datto performs automatic verification of backups to ensure that data has been accurately captured and stored without corruption or errors.
• Alerting on Backup Failures: Real-time notifications if backup processes fail or encounter errors, allowing administrators to quickly address any issues.
-
Protection Against Data Loss
• Accidental or Malicious Deletion Protection: Backup snapshots are automatically created, protecting data from accidental deletions by users or admins in Microsoft 365, as well as malicious data destruction attempts.
• Protection Against Retention Gaps: Even if data is permanently deleted from Microsoft 365 due to retention policies, the backup remains available, providing an extra layer of data security.
-
API Access Control
API access is tightly controlled, ensuring that only authorized applications can interact with the backup environment, limiting potential attack vectors.
-
Tamper Alerts
Provides notifications if there are any unauthorized attempts to alter or delete backup data.
Disaster Recovery Plus (With Cyber Recovery)
Disaster Recovery Plus (with Cyber Recovery) is a comprehensive solution designed to protect businesses from data loss, system failures, and cyber threats like ransomware. It integrates disaster recovery with cyber recovery, ensuring critical systems and data are backed up, tested regularly, and can be swiftly restored after an attack or failure. This approach minimizes downtime and ensures business continuity by providing automated data integrity checks, secure backups, and robust recovery processes in the event of a cyber incident.
-
Create an IT-centric Disaster Recovery Plan (Comprehensive)
Conduct risk assessment and business impact analysis
Determine recovery objectives
Assign roles and responsibilities within your DR team
Prepare for failback
Arrange to store critical documents in multiple remote locations
Establish equipment needs
Enable communication channels
Detail disaster response procedures
Establish reporting mechanism to stakeholders a DR plan
Maintain the DR plan
Publish agreed DR strategy
-
Cyber Recovery Planning
Documentation of the steps within Six Star: Secure that constitute a Cyber Recovery plan
-
Data Integrity Verification
Verify backups and restore paths of all critical systems and data
-
Test Restores
Perform test restores every quarter.