RecoveryVault Cloud Backup

November 2015 Infrastructure, Products & Solutions

According to an EMC report released earlier this year, the digital universe is doubling in size every two years and will multiply 10-fold between 2013 and 2020 – from 4.4 trillion gigabytes to 44 trillion gigabytes. While backup costs are halving every year, prices are not dropping fast enough to match this rate of data growth and recovery will soon become unaffordable for many organisations.

Businesses are moving away from tape backup, which can be unreliable and expensive, and are more comfortable with storing their data in the cloud – especially as security improves.

Service providers are experienced in maintaining and supporting backup infrastructure. They can assist organisations with implementing the required technology and provide them with the tools they need to manage their backups.

Organisations can also leverage the economy of scale offered by service providers who have access to massive storage vaults and can provision space in their data centres at lower cost – and more securely – than if the client were to manage that themselves.

While it may be relatively easy to back up data, the real value lies in the ability to restore lost or compromised data in an environment that it can actually be used – and within agreed upon timeframes. RecoveryVault agentless backup and recovery software is the only end-to-end cloud backup enablement solution flexible enough to meet the needs of customers ranging from small businesses to the global enterprise. As the first service provider in the region to deploy the Asigra Recovery License Model (RLM), Global Micro provides end-customers with immediate backup savings and long-term cost controls.

Designed for efficient performance and compatibility with public, private and hybrid cloud architectures, RecoveryVault Cloud Backup powered by Asigra offers:

• End-to-end protection of enterprise application data in physical, virtual, mobile and cloud environments to eliminate the complexity of multiple point solutions.

• Agentless software architecture for easier deployment, management and performance/security advantages in virtualised IT infrastructure.

• New pricing model options that include the Recovery License Model (RLM) or Capacity License Model (CLM), which only charges customers for the amount of data they recover, not the amount they back up.

• Global de-duplication and data compression technology to improve storage optimisation and network throughput.

• NIST FIPS 140-2 certified security, including AES 256 encryption for military-grade data security.

• Autonomic healing and validation restore capabilities for recovery assurance.

• Support for 80 different platforms and databases across the entire digital footprint, from storage and servers, to desktops and laptops on the enterprise LAN, as well as remote tablets, laptops and smartphones.

• LAN Discovery, which scans the entire network and discovers all data on all devices, categorises it for long- or short-term storage, and calculates data growth.

For more information contact Global Micro, +27 (0)11 731 0600, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Bosch sells product business to Triton
Bosch Building Technologies News & Events Products & Solutions Facilities & Building Management
Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The division is set to focus on systems integration business in the future.

Read more...
Five tech trends shaping business in 2025
Information Security Infrastructure
From runaway IT costs to the urgent need for comprehensive AI strategies that drive sustainable business impact, executives must be prepared to navigate a complex and evolving technology environment to extract maximum value from their investments.

Read more...
Threats, opportunities and the need for post-quantum cryptography
AI & Data Analytics Infrastructure
The opportunities offered by quantum computing are equalled by the threats this advanced computer science introduces. The evolution of quantum computing jeopardises the security of any data available in the digital space.

Read more...
Navigating today’s cloud security challenges
Information Security Infrastructure
While the cloud certainly enables enterprises to quickly adapt to today’s evolving demands, it also introduces unique challenges that security teams must recognise and manage. Vincent Hwang offers insights from the 2025 State of Cloud Security Report.

Read more...
Workforce management automation for Transguard
IoT & Automation Products & Solutions
Invixium and RTLS-connected worker solutions have been selected to supply 400 rugged biometric solution, IXM TITAN, for time tracking at work sites for Transguard Group, a subsidiary of Emirates Group.

Read more...
Smart access for a safer community
neaMetrics Suprema Access Control & Identity Management Residential Estate (Industry) Products & Solutions Commercial (Industry)
Suprema has released its BioEntry W3 facial authentication access control device with multiple authentication options, including RFID cards as well as mobile credentials, designed for durability and resilience.

Read more...
Smarter ways to secure your space
Elvey Security Technologies Access Control & Identity Management Products & Solutions
Ensuring the safety of people and assets has become more crucial than ever, and access control systems provide essential tools to regulate and monitor who can enter specific areas or access sensitive resources.

Read more...
The rise of autonomous data recovery
Information Security Infrastructure
Escalating cyberthreats and attacks constantly put businesses under pressure, increasingly prompting organisations to shift their mindsets towards ensuring continuous operations and thus avoiding downtime and revenue loss.

Read more...
Guarding data privacy
Suprema Access Control & Identity Management Products & Solutions
Suprema’s BioEntry W3 is designed with data privacy as a top priority, addressing concerns through its display-free design and highly secure ‘Template on Mobile’ (ToM) authentication, making data privacy a top priority.

Read more...
Can we really fight AI cybersecurity threats with more AI?
Information Security Infrastructure
In a world where artificial intelligence (AI) is increasingly being weaponised by cybercriminals, the question of whether we can effectively combat AI threats with more AI is not just a technical inquiry but a pressing global concern

Read more...