Backup and Recovery from Redstor
Data management needs to work the way you do, in real time. But with sprawling, complex estates, businesses today find it hard to confidently control...
Backup and Recovery
Making downtime a thing of the past.
Reject risk - preventing data loss is a challenge facing all organisations every day...
Effective data recovery is only possible with a robust, policy-driven and fully automated data backup methodology. Many backup procedures rely on human involvement to ensure that they take place; unfortunately, monitoring and managing a manual backup process is a tedious and time-consuming task and is easily forgotten.
Data management needs to work the way you do, in real time. But with sprawling, complex estates, businesses today find it hard to confidently control all their data. Security incidents, data breaches and hardware failures can bring companies to a complete standstill, cripple their teams and ruin their reputation. Full recovery from a disaster can take days or weeks, and low-level admin tasks tend to take around 70% of an IT professional’s time.
Traditional backups are unreliable, complicated, time-consuming and costly once organisations factor in the grey costs, such as time taken to manage non-automated solutions, or transporting and storing physical media. In addition, legacy backup technologies typically cannot scale to support the explosion in new apps and growing data sets experienced
by most businesses today.
How quickly you respond to and recover from a disaster will ultimately define your business; and no-one can afford to risk catastrophic fines, reputational damage or loss of business.
Companies today also need complete visibility and control over their data to achieve compliance with data protection legislation and regulation such as GDPR. They need to know they can access the lifeblood of their business data at a moment’s notice, and they need to eliminate manual overheads using intelligent automation to drive down costs and improve reliability. Historically, these abilities were only available to businesses that could afford an enterprise-grade data management solution.
BFL Canada has reduced their Recovery Time Objective from 16 hours to 15 minutes: “Redstor has saved us completely, several times.
Jorge Barreto, Enterprise Architect
How much data do you currently protect?
Demolish downtime - at Redstor we’re disrupting data management and changing everything you know about backup and recovery.
Introducing pioneering backup & recovery
Whether your data is on-prem, in the cloud or stored in a hybrid environment, our pioneering technology provides streamed, on-demand access to all your data. With unthrottled recovery you can stream it in real time to any device. At the click of a button, we get you up and running within seconds, not days.
We can help you radically reduce the threat posed by malware and minimise the potential for data breaches, whilst making downtime a thing of the past. With Redstor, you can quickly and easily restore data to its original location or a new location of your choice.
Complete ad-hoc file recoveries or full system restores at any time and as often as required, at no additional charge. We ensure your data is always available, instantly.
The days of high storage costs, siloed data and difficult data access are over.
Every day we help more than 40,000 customers around the world simplify the task of backing up critical business data and systems.
Our pioneering data management solution offers rapid data restoration and enables organisations to easily meet Recovery Point Objectives and Recovery Time Objectives to ensure their business is ‘always-on’.
See the future of data management. Now.
No need to wait - protect your data today and see how fast and easy it is to manage
Speed - Set up and scale fast - what may have taken days in the past, will now take hours. No hardware, no upfront professional services costs, no management overhead, no complex licensing models.
TRY FOR FREE
Control – A powerful, self-service portal eliminates vendor bottlenecks. You are free to deploy, manage and scale backup and recovery quickly and easily (24/7 support remains on hand if required).
Compare Redstor now with any existing data management solution you may have
Value - With a 4-in-1 offering and competitive pricing, Redstor offers best value for money in the marketplace. When you pay for backup and recovery, you also get archiving and DR - to help with compliance - and it's all included in the price.
Smart – If you decide to protect Microsoft 365 or Google Workspace data too, you can view and manage cloud and on-prem data in the same place, saving on time and operational overheads.
Features and benefits
Backup and recovery from Redstor
Radically reduce the impact of security incidents, data breaches and hardware failures, with a fast, proven backup and recovery service. With our unique, user-driven streaming technology, you don’t need to wait for a full recovery. At the click of a button, we get you up and running within seconds, not days.
Deploy your way
Deploy backup and recovery in a way that best suits your business - with a cloud-based SaaS solution that not only delivers immediate access to your data, but also comes with the option of a local copy. We help you protect your entire infrastructure, regardless of whether it is physical or virtualised. And with flexible deployment options available, Redstor can be implemented in a matter of minutes, with backups ready to run instantly or in line with automated schedules.
Centralised control with our web-based control centre
Manage and protect your critical data, wherever it is in the world via a single control centre. Gain borderless visibility of local and online data across your entire estate through our centralised management console. Move data between platforms, transparently, with no downtime.
Radically reduce backup and storage costs
Our pricing model is simple, cost effective and predictable. Our easy installation and lack of hardware, media, or transit costs, mean that you can easily scale up or down as demand changes. No hidden
costs, no surprises.
Liberate your IT Team
With intelligent, policy-driven automation, powerful monitoring and sophisticated reporting, your IT team can manage by exception and easily evidence compliance. Fast to deploy and easy to manage, our pioneering solution requires zero human intervention on a daily basis.
Built to scale
Our solution requires no additional on-prem infrastructure and can back up large data sets and complex environments seamlessly, while ensuring compliance. And by compressing all data, we minimise the demand on bandwidth by reducing the amount of data sent, stored and recovered.
Protect Google Workspace and Microsoft 365
as part of an automated, policy-driven, unified data management strategy
Avoid the risk of storing all your data with one provider.
Back up Microsoft 365 and Google Workspace data directly from their cloud to the Redstor cloud, all through an intuitive web interface.
Simplify and automate your data management and assign consistent protection policies across your entire data estate with one central, easy-to-use system.
Our pioneering backup and restore technology provides on-demand access to all of your data - wherever it is stored - and delivers borderless visibility at any time, on any device.
Redstor allows you to:
- Establish a consistent data protection policy across your whole estate, viewing cloud and onsite data through a single app
- Address e-discovery requirements and comply with General Data Protection Regulation by recovering data promptly
- Define Microsoft 365 and Google Workspace retention periods and ensure they are aligned to your business requirements
- Set up in minutes, and auto-scale the protection you need - without the need for capital expenditure
- Avoid lock-in. Migrate data easily
- Deliver centralised management of data in SharePoint, Exchange, OneDrive, Teams, OneNote, Google Drive, Gmail and Google Classroom without circumventing Microsoft or Google Workspace security and auditing
- Retain full control of your data for business continuity by mitigating the risk of storing it with the cloud service provider
- Benefit from faster, simpler recoveries with on-demand access to data in the event of accidental deletion or ransomware
Single web-based control centre
Modern businesses need a unified view of all their data. Manage and protect Microsoft 365 and Google Workspace data via a single control centre as part of a centralised data management solution. Gain borderless visibility of local and online data and set policies across your entire estate.
Additional layer of protection for malware-free recoveries
AI for the detection and removal of malware in backups
Most organisations will have a form of anti-virus and anti-malware protection in place, but on average it takes 200 days or more to uncover a malicious attack, longer than many typical retention policies.
In this case malware will be present within all backups as well as the live environment. This makes it very problematic to perform a malware-free recovery.
Whenever you perform a recovery you need to know that your backups from servers, laptops, Microsoft 365 or Google Workspace are regarded as safe.
Redstor has developed an advanced, machine-learning model to detect, isolate and delete malware from backups, providing that additional layer of protection and peace of mind.
Purchased as an add-on, Redstor’s malware detection supports servers, laptops, Microsoft 365 and Google Workspace - without you needing to configure or install anything.
Our machine-learning model continues to train itself, based on results and the latest real-world events and threats, refining and improving its accuracy.
When suspicious files are detected Redstor quarantines them before they infect systems.
You then have the option to validate the files, delete them from the backup set or revert to previous ‘safe’ versions.
User Access Management for complete control
Redstor delivers a whole new level of control and security to organisations seeking greater visibility into backing up and managing their own data as part of their managed service.
The RedApp, Redstor’s app for smart data management and protection, has been specifically designed for granular, configurable Identity and Access Management. This enables you to:
Set up strong security
Protect against data breaches, identity theft and forbidden access to confidential information. Prohibit the spread of compromised login credentials. Block unauthorised entry to your organisation’s network. Bolster your defences against ransomware, hacking, phishing, and other cyber-attacks.
Streamline IT workloads
Update a security policy easily and comprehensively. Change all access privileges across your organisation in one action and save IT time by automating more tedious tasks e.g. password reset requests.
Comply with regulations
Quickly implement IAM best practices to meet the requirements of industry regulations e.g. Health Insurance Portability and Accountability Act and General Data Protection Regulation.
Enable secure collaboration with third parties
Achieve greater productivity by giving external parties (customers, suppliers, and visitors) access to your network without jeopardising security.
Simplify user experience
Free users from having to remember and enter numerous, complex passwords. With tighter IAM control, you can allow them to access multiple systems under Single Sign On and make use of biometrics or smart cards.
Secured by the very latest multi-factor authentication technology, UAM enables you to:
- Create and manage user identities within a single interface
- Customise and control who has access to your data
- Protect key processes with multi-layer security
If your data is spread over many sites or multiple regions, but you wish to delegate permissions to regional offices, you can restrict and allow access accordingly.
To avoid any risk of unwanted deletions, roles can also be customised in the RedApp to remove the ability to delete accounts and data.
By delivering greater control of user accounts, Redstor’s UAM avoids having to divide up an estate and assign admins with more access than is deemed secure.
Administrators can lock down specific users if an employee leaves the organisation or a login is compromised.
The introduction of mandatory 2FA using the more secure TOTP (time-based, one-time password) method also protects against malicious activity.
Administrators can choose from a wide variety of roles depending upon their access needs and can customise the granular permissions of each role for customers and products.
Administrators have an audit trail of who uses the platform with respective roles and actions. They can also manage users in bulk if required and obtain insight into user activity.
Easily enable the right person to take swift, comprehensive action in the event of human error, malicious activity or cyber-attack, while avoiding alerting an attacker or creating internal confusion.
The future of data management. Now.
InstantDataTM streams your business-critical data for immediate access from any location. While the rest of your data is restored behind the scenes, users can start accessing the files that they need immediately. By seemingly recovering massive systems in moments, we obliterate your RTO. We make auditing and integrity checks incredibly easy.
Our solution is designed to have minimal or no human intervention throughout its daily management. Cloud backups run to an automated schedule, allowing you to back up data as little or as often as you’d like, at the click of a button. No human error, no risk.
Encrypted at source using Advanced Encryption Standard with a 256-bit key length, your data remains protected with a customer-defined key.
Our intelligent technology encrypts data at source, deduplicates and compresses it. Not only does this greatly reduce the size of each file
transmitted, making it bandwidth efficient, but only changed data is transmitted and stored – radically reducing costs.
Single web-based control centre
Provision, monitor, maintain and report on backup and recovery through a single control centre, using any device. Users can now create schedules, adjust retention policies and configure bandwidth usage through a centralised management console.
Back up a wide range of environments. Enjoy distributed processing and configure
multiple clients in a matter of minutes.
TRY FOR FREE
Guaranteed data sovereignty
With zero downtime and guaranteed data sovereignty, your data remains 100% safe in our dedicated, highly secure, local data centres. Our engineers are available 24/7/365 to provide expert advice wherever you are in the world.
Restore data at all levels from single granular objects to folders, VMs or entire servers. Data can be restored from the backup client, management console, through web access or via InstantData™. Plus, our cloud-to-cloud backup solution provides rapid restore for Microsoft 365, Google Workspace and SaaS applications - and in the event of a catastrophic failure, your data can also be physically transported to you via a removable storage device.
Our backup window now has shrunk massively.
David Cassidy, Head of IT, Travers Smith
What is your biggest challenge around backup and recovery?
- The threat of security incidents and how quickly you can recover
- Time spent on administrative tasks
- Cost of backup technology
- Limitations of legacy backup technology
- Gaining visibility of all of your data
See the future of data management
We are disrupting the world of data management with our pioneering technology, which provides visibility and streamed, on-demand access to all your data, wherever it is stored, through a single control centre. Trusted by more than 40,000 global customers across all industries, we use our proven, leading technology to help you discover, analyse, control and protect your critical data.
See the future of data management:
or call us on +44 (0) 118 951 5200 or visit www.redstor.com
Recovery with InstantData
How to set up malware detection for backups
Backup and recovery brochure
Disaster recovery brochure
Google Workspace brochure
Microsoft 365 brochure
TRY FOR FREE
Backup and recovery datasheet
Google Workspace datasheet
Microsoft 365 datasheet