FAQs

Q?

Common Questions about Cloud Disaster Recovery

A.

  1. How does it work?

Cloud Disaster Recovery mirrors your infrastructure to a local backup appliance or Local Data Vault. That device runs VMWare and can mount any of your servers for recovery. Then that data is replicated to offsite data storage in our secure data centers where we build a virtual copy of your entire infrastructure for failover. This provides a true disaster recovery site for your business. You can boot servers and restore from the local backup appliance or if there is ever a site disaster, you can failover to our data center to continue workflow from anywhere you can get an internet connection.
Cloud Disaster Recovery offers the best and only way to return to normal operations after any kind of loss. From simple failures like losing files or emails, to more severe failures like losing an entire server, to a complete loss of a company’s entire infrastructure, Cloud Disaster Recovery offers the fastest, easiest and most cost effective recovery option available.
It doesn’t end there. We monitor the updates and back-ups and contact you if anything goes wrong or if you need any type of reconfiguration. And just to be sure, we’re backing up the backup that you have on-site and that we have in our data center and a second data center.

  1. How fast can I get started?

A full implementation for Cloud Disaster Recovery includes a local backup appliance, which is usually delivered within a day or two of your order. You are protected locally right away, but it takes a couple more days for us to build your virtual environment in our data centers and perform a test. At that point you have local data protection, offsite data backup and full disaster recovery capability.

  1. How do I know my data is secure?

Again, we cover you in a number of ways. Not only are we backing up all your data at our primary data center. We’re backing up our backup of your data to a second redundant data center. Both data centers are SAS 70 Type 2 certified and offer tightly controlled security backed by electrified perimeters as well as steel doors protecting the entire center. We’ve never had a breach, and your data is housed at a very high encryption rate AND you retain the private key on your systems. Your data is then stored in the same environment selected for securing extremely sensitive information by numerous notable organizations.

  1. How do you test it?

Aside from our constant monitoring of your account, we also test a disaster recovery scenario with you two or more times a year. The facts are, you don’t want to find out that your data back-up wasn’t working AFTER you have a disaster and really need it. We make sure it’s working all the time.

  1. How fast can we recover from a loss or disaster?

It depends on how large your loss is but typically, you’ll have access to your data within 60 minutes because you have a mirror the local backup appliance. Restoring to your whole enterprise may take longer depending on the service you have chosen, but we can tailor your solution to the required your Recovery Time Objective (RTO).

  1. What about your data centers – how secure are they?

24/7 manned security keeps watch over our facilities. Additional high level physical security and advanced security protocols assure integrity and functionality of the environment. Redundancy of fiber optic telecommunication links and electrical power, including emergency backup power generation, add to overall resilience.

  1. 7. What technology makes this all work?

We use VMWare’s “virtualization technology” which allows us to create virtual networks that are firewalled for security. Using VMWare technology, we are able to set up and run an entire environment, including the operating system, all your programs, disks, RAM, CPU – everything, as a virtual machine instead of having to buy a new real, physical system. When you need to recover your data and systems, we push that virtual environment back to you.

  1. What size businesses do you serve?

The typical customers for Cloud Disaster Recovery are businesses who use 1 – 50 severs. Our services are scalable to your needs.

  1. What does is cost?

Request a quote here.

  1. How/why did you decide to build this solution?

We wanted to build a data protection solution providing local backup, remote backup and the real recovery options that businesses need as well as something that is highly cost-effective. We believe that data protection and disaster recovery is a critical component to any enterprise – no matter the size – and our mission is to deliver the service in an unparalleled fashion.
 

Q?

Why do I need to encrypt my data?

A.

Why do you put locks on your doors? Encrypting your data is essential if you want to maintain privacy and cyber security. Unfortunately we live in a world where cybersecurity has been sacrificed for mobility. There are too many cyber criminals looking to gain access to your information for malicious purposes. Even countries are utilizing hacking armies to infiltrate businesses and personal computers in order to obtain secrets for their own profit and competitive edge benefiting their military, industry, or other interests.

Q?

What is the highest level of encryption that is legal in the United States?

A.

Unlike some countries such as China and the United Kingdom, the USA places no restrictions on the level of encryption you may use to protect your data. At AllData N.S. Inc., we offer our proprietary closed loop encryption technology that is rated at a level many times greater than what is currently in use by the US government today. Technical specs are classified and more information is available only after the signing of a mandatory Non-Disclosure Agreement (available here).

Q?

What level of encryption do you secure networks with?

A.

Depending on whether we are securing the network for military, commercial, or home office, the level of encryption may vary. However no matter what level of encryption we provide, you can be sure that your network is utilizing better than government grade data encryption so nobody can get in.

Q?

What happens if the government/law enforcement requests access to my data?

A.

If Government or Law Enforcement requests your data, it is up to you whether you want to incriminate yourself or not. Not saying whatever you're doing is bad or otherwise; you have the right to say no. It would take a court order to get the key from you, but since the supreme court has already said on two occasions  “it ain't gonna happen”, why would you give your data up?
Even if your data was forcefully taken from our servers, with current technology it would take millions and millions of years with every processor on earth working to decrypt it. We could not provide anyone access to your data - even if we wanted to.

Q?

If I lose my key or password, can my data be recovered?

A.

No. DO NOT LOSE YOUR KEY! If you lose your private key, your data is unrecoverable and will be lost forever.

Q?

Can I use this technology to secure my home network?

A.

Yes, in fact we have many clients that have privacy and ehealth concerns and utilize our firewalls to protect their home network and data from prying eyes, cybercriminals, viruses, malware, and/or other malicious activities.

Q?

Can I use this technology to secure my VoIP communications?

A.

Yes. Depending on the end user equipment capabilities, the communication medium (i.e. Apple, the most insecure toy on the Market), connection and the strength of that connection will determine the level of the encryption.

Q?

Is it affordable?

A.

Our cybersecurity solutions are surprisingly affordable. Our customers end up saving money by preventing data breaches and malicious attacks against their systems.
Call for a free consultation with a friendly and knowledgeable cybersecurity specialist today.

(214) 660-0670