• Skip to primary navigation
  • Skip to content
  • Skip to footer
Data Shepherd

Data Shepherd

The lead provider of cutting edge IT and Cyber Security solutions

MENUMENU
  • HOME
  • SOLUTIONS
    • GDPR TOOLKIT
    • CYBER SECURITY
      • CYBER DEFENCE
      • WEBSITE SECURITY
      • PC SECURITY
    • CONSULTANCY
      • PENETRATION TESTING
      • NETWORK AUDIT
    • EMAIL
      • HOSTED EXCHANGE
      • EMAIL SECURITY
      • PHISHING SIMULATION
    • ONLINE BACKUP
    • HOSTED SERVICES
    • CERTIFICATE MANAGEMENT
    • MEDICAL SERVICES
  • PARTNER LOCATOR
  • BLOG
  • RESOURCES
  • ABOUT
    • COMPANY PROFILE
    • MEET THE TEAM
  • CONTACT
01617110103 | info@datashepherd.co.uk

Online Backup

Secure Online Backup

Secure online backup

Our secure online backup will make copies of critical data so that these additional copies can be used to restore the original following a data-loss disaster. In addition, we can provide another level of protection by allowing replication of the remote backup server(s) to another remote location. This gives a double protection that cannot be provided by other backup software alone. This backed up data is 100% restorable to its original formats, when needed, by simply clicking a few buttons

 

Read more

We offer on-premises, cloud or hybrid solutions which can be used by Businesses or any managed service provider.

The service can be deployed within a company to back up all virtual machines, servers, desktops and laptops as a local or on the cloud. Managed service providers can also use it as a white labelled solution offering secure managed backup service to their clients.

digital

All platforms and common databases supported

We support all leading operating systems including Windows, Linux, Mac, NetWare, UNIX, NAS devices, etc. Secure Online Backup comes with specially designed modules for backing up common database applications, including Microsoft Exchange Server, Microsoft SQL Server, Lotus Notes/Domino, Oracle, MySQL and many more. This allows you to back up all these databases professionally as recommended by their respective software vendor. If the databases or applications you are using in-house are not listed here, don’t worry. Our extensible and easily configurable command line tools enable you to add custom backup logics to basic backup operation through simple scripting.

Easy to use and manage

After the initial setup of the client-side backup application, backup jobs will run automatically every day without requiring human effort. Restore operations can be done in just a few clicks when needed. With the integrated web administration console, system administrators can easily manage the accounts of all backup users. Users and system administrators can be updated by the sending out of comprehensive backup reports via email on a daily basis.

What makes our solution the ultimate backup solution?

Our goal is to make copies of critical data so that these additional copies can be used to restore the original following a data-loss disaster. Data can be copied, compressed, 128-bit / 256-bit encrypted and finally uploaded to a remote server located offsite through Secure Sockets Layer (SSL). This backed up data is 100% restorable to its original formats, when needed, by simply clicking a few buttons. In addition, we can provide another level of protection by allowing replication of the remote backup server(s) to another remote location. This gives a double protection that cannot be provided by other backup software alone.

The advanced, continuous data protection (CDP) technology captures every version of a file that has been saved to your hard drive. With CDP, even if your hard drive crashes completely after you have worked for a full day without invoking a backup manually yourself, the saved copy of your working files will still be intact on the backup server. It provides a highly dependable means of real-time, continuous data protection for servers, desktops, and laptops effortlessly and transparently. In addition, backup will only run when the computer is idle, or when the level of CPU utilisation falls below a specific percentage (e.g. 20%), leaving backup operation completely transparent to users.

Conventional approaches to backup are not good enough

As cyber security consultants, we have to advise that poor “unstructured” conventional backup methodologies, such as tape, CD Rom, and external hard drive, etc., are not good enough because of:

  • High failure rates during restoration.
  • Slow read / write speed.
  • Difficulty in detecting problems of backup before performing restoration.
  • High maintenance cost.
  • Expensive offsite storage of tape library.
  • Reduced flexibility for backup caused by fixed capacity per backup media.
  • Increased likelihood of occurrence of negligence-induced problems (e.g. lost or misplaced data.

Key Features & Benefits

  • Encrypted at source & secure transfer (SSL).
  • Backs up most known, operating systems, databases, files, applications & virtual environments.
  • 100% Restorable.
  • Military grade encryption.
  • User friendly management console.
  • Unique compression rate.
  • Optimising technologies.
  • Multiple restore options to suit.
  • Competitive pricing.
  • No capital outlay.
  • Compatible with your existing IT infrastructure.

Footer

Social

Follow along on social media.

  • Facebook
  • LinkedIn
  • Twitter

Contact

Data Shepherd Ltd
353 Altrincham Road
Manchester
M22 4BJ
Get directions
+44 (0)161 7110103
info@datashepherd.co.uk

Navigation

MENUMENU
  • HOME
  • SOLUTIONS
    • GDPR TOOLKIT
    • CYBER SECURITY
      • CYBER DEFENCE
      • WEBSITE SECURITY
      • PC SECURITY
    • CONSULTANCY
      • PENETRATION TESTING
      • NETWORK AUDIT
    • EMAIL
      • HOSTED EXCHANGE
      • EMAIL SECURITY
      • PHISHING SIMULATION
    • ONLINE BACKUP
    • HOSTED SERVICES
    • CERTIFICATE MANAGEMENT
    • MEDICAL SERVICES
  • PARTNER LOCATOR
  • BLOG
  • RESOURCES
  • ABOUT
    • COMPANY PROFILE
    • MEET THE TEAM
  • CONTACT

Our latests tweets

Data Shepherd LtdFollow

Data Shepherd provides a wide range of information technology security solutions to businesses both in UK and Internationally.

Data Shepherd Ltd
Retweet on TwitterData Shepherd Ltd Retweeted
reblazeReblaze@reblaze·
3 Nov 2021

In #WebApp security, an ideal #security system correctly evaluates all incoming #traffic.

In #threat identification, there are two types of errors: false positives and false negatives.

Do you know what a false negative alarm is?

https://loom.ly/jheUsQM

Reply on Twitter 1455965558621577216Retweet on Twitter 14559655586215772161Like on Twitter 14559655586215772161Twitter 1455965558621577216
Retweet on TwitterData Shepherd Ltd Retweeted
reblazeReblaze@reblaze·
3 Nov 2021

During peak #holidayseason, few things are worse than having a #security incident or a prolonged #outage for online #retailers.

Here are 5 actions #eCommerce sites should take to ensure a successful and safe #HolidayShopping season 👉https://loom.ly/qWqdyB4 👈

Reply on Twitter 1455920273585278978Retweet on Twitter 14559202735852789782Like on Twitter 14559202735852789782Twitter 1455920273585278978
Retweet on TwitterData Shepherd Ltd Retweeted
CumbriaPCRepairCumbria Computer Repairs@CumbriaPCRepair·
3 Nov 2021

Common Cyber Attacks from the NCSC #CyberAware #CyberSecurity # #onlinesafety

Reply on Twitter 1455885067205623809Retweet on Twitter 14558850672056238091Like on Twitter 14558850672056238091Twitter 1455885067205623809
Retweet on TwitterData Shepherd Ltd Retweeted
soVisionITsoVision IT@soVisionIT·
3 Nov 2021

There's no better feeling than helping during the season of giving; this is why we are proud to collaborate with Time is Precious for another year running. This charity helps collect gifts for ill children and their carers, so why not get involved and donate to a good cause?

Reply on Twitter 1455881361861091336Retweet on Twitter 14558813618610913361Like on Twitter 14558813618610913363Twitter 1455881361861091336
Retweet on TwitterData Shepherd Ltd Retweeted
Bellingham_ITBellingham IT@Bellingham_IT·
3 Nov 2021

4 Weeks To Go!

The countdown is on as we prepare for our third cyber security webinar of the series.

Book your place now to ensure you don't miss out: https://bit.ly/2YFLw0e

#cybersecurity #webinar #team #events

Reply on Twitter 1455822148673617923Retweet on Twitter 14558221486736179231Like on Twitter 1455822148673617923Twitter 1455822148673617923
Load More...

Copyright © 2023 · Business Pro Theme on Genesis Framework · WordPress · Log in

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.OkPrivacy policy