• Skip to primary navigation
  • Skip to content
  • Skip to footer
Data Shepherd

Data Shepherd

The lead provider of cutting edge IT and Cyber Security solutions

MENUMENU
  • HOME
  • SOLUTIONS
    • GDPR TOOLKIT
    • CYBER SECURITY
      • CYBER DEFENCE
      • WEBSITE SECURITY
      • PC SECURITY
    • CONSULTANCY
      • PENETRATION TESTING
      • NETWORK AUDIT
    • EMAIL
      • HOSTED EXCHANGE
      • EMAIL SECURITY
      • PHISHING SIMULATION
    • ONLINE BACKUP
    • HOSTED SERVICES
    • CERTIFICATE MANAGEMENT
    • MEDICAL SERVICES
  • PARTNER LOCATOR
  • BLOG
  • RESOURCES
  • ABOUT
    • COMPANY PROFILE
    • MEET THE TEAM
  • CONTACT
01617110103 | info@datashepherd.co.uk

Online Backup

Secure Online Backup

Secure online backup

Our secure online backup will make copies of critical data so that these additional copies can be used to restore the original following a data-loss disaster. In addition, we can provide another level of protection by allowing replication of the remote backup server(s) to another remote location. This gives a double protection that cannot be provided by other backup software alone. This backed up data is 100% restorable to its original formats, when needed, by simply clicking a few buttons

 

Read more

We offer on-premises, cloud or hybrid solutions which can be used by Businesses or any managed service provider.

The service can be deployed within a company to back up all virtual machines, servers, desktops and laptops as a local or on the cloud. Managed service providers can also use it as a white labelled solution offering secure managed backup service to their clients.

digital

All platforms and common databases supported

We support all leading operating systems including Windows, Linux, Mac, NetWare, UNIX, NAS devices, etc. Secure Online Backup comes with specially designed modules for backing up common database applications, including Microsoft Exchange Server, Microsoft SQL Server, Lotus Notes/Domino, Oracle, MySQL and many more. This allows you to back up all these databases professionally as recommended by their respective software vendor. If the databases or applications you are using in-house are not listed here, don’t worry. Our extensible and easily configurable command line tools enable you to add custom backup logics to basic backup operation through simple scripting.

Easy to use and manage

After the initial setup of the client-side backup application, backup jobs will run automatically every day without requiring human effort. Restore operations can be done in just a few clicks when needed. With the integrated web administration console, system administrators can easily manage the accounts of all backup users. Users and system administrators can be updated by the sending out of comprehensive backup reports via email on a daily basis.

What makes our solution the ultimate backup solution?

Our goal is to make copies of critical data so that these additional copies can be used to restore the original following a data-loss disaster. Data can be copied, compressed, 128-bit / 256-bit encrypted and finally uploaded to a remote server located offsite through Secure Sockets Layer (SSL). This backed up data is 100% restorable to its original formats, when needed, by simply clicking a few buttons. In addition, we can provide another level of protection by allowing replication of the remote backup server(s) to another remote location. This gives a double protection that cannot be provided by other backup software alone.

The advanced, continuous data protection (CDP) technology captures every version of a file that has been saved to your hard drive. With CDP, even if your hard drive crashes completely after you have worked for a full day without invoking a backup manually yourself, the saved copy of your working files will still be intact on the backup server. It provides a highly dependable means of real-time, continuous data protection for servers, desktops, and laptops effortlessly and transparently. In addition, backup will only run when the computer is idle, or when the level of CPU utilisation falls below a specific percentage (e.g. 20%), leaving backup operation completely transparent to users.

Conventional approaches to backup are not good enough

As cyber security consultants, we have to advise that poor “unstructured” conventional backup methodologies, such as tape, CD Rom, and external hard drive, etc., are not good enough because of:

  • High failure rates during restoration.
  • Slow read / write speed.
  • Difficulty in detecting problems of backup before performing restoration.
  • High maintenance cost.
  • Expensive offsite storage of tape library.
  • Reduced flexibility for backup caused by fixed capacity per backup media.
  • Increased likelihood of occurrence of negligence-induced problems (e.g. lost or misplaced data.

Key Features & Benefits

  • Encrypted at source & secure transfer (SSL).
  • Backs up most known, operating systems, databases, files, applications & virtual environments.
  • 100% Restorable.
  • Military grade encryption.
  • User friendly management console.
  • Unique compression rate.
  • Optimising technologies.
  • Multiple restore options to suit.
  • Competitive pricing.
  • No capital outlay.
  • Compatible with your existing IT infrastructure.

Footer

Social

Follow along on social media.

  • Facebook
  • LinkedIn
  • Twitter

Contact

Data Shepherd Ltd
353 Altrincham Road
Manchester
M22 4BJ
Get directions
+44 (0)161 7110103
info@datashepherd.co.uk

Navigation

MENUMENU
  • HOME
  • SOLUTIONS
    • GDPR TOOLKIT
    • CYBER SECURITY
      • CYBER DEFENCE
      • WEBSITE SECURITY
      • PC SECURITY
    • CONSULTANCY
      • PENETRATION TESTING
      • NETWORK AUDIT
    • EMAIL
      • HOSTED EXCHANGE
      • EMAIL SECURITY
      • PHISHING SIMULATION
    • ONLINE BACKUP
    • HOSTED SERVICES
    • CERTIFICATE MANAGEMENT
    • MEDICAL SERVICES
  • PARTNER LOCATOR
  • BLOG
  • RESOURCES
  • ABOUT
    • COMPANY PROFILE
    • MEET THE TEAM
  • CONTACT

Our latests tweets

Copyright © 2025 · Business Pro Theme on Genesis Framework · WordPress · Log in

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.OkPrivacy policy