Our Solution

We are proud that our solution is a hybrid back-up solution that links your on-premises infrastructure to a secure Australian based Data Centre.

This leading-edge technology ensures that your data remains secure and accessible, even in the event of natural disaster or hardware failure.

Significantly, all data stays on-shore in Australian data centres for additional privacy and compliance, ensuring your sensitive information is protected by Australian law.

Our Solution Includes

  • A purpose built on-site appliance
  • A fully automated backup process
  • Infinite cloud backup. E.g, 5+ years of backup retention
  • Automatic 'whole-of-server' snapshots with advanced verification and reporting to ensure successful backups
  • Local appliance sync to the cloud for redundancy, across multiple Australia Data Centres
  • Ability to run a virtualized server on-site, in the backup appliance, or in the cloud
  • Ability to recover files from the local device, or via the cloud
  • AES 256 and SSL key-based encryption for data security and compliance
  • Protect any physical or virtual infrastructure running on Windows, VMware or Mac

Instant Virtualisation

Virtualisation refers to the process of creating a virtual version of something, whether it’s a server, storage device, network or application. The “virtual” version acts completely separate from the physical device.

Backups can be virtualized either locally on the backup applianceor remotely in the secure data centre, in seconds, with the click of a button. The advanced web interface allows for configuration of CPU and memory resources. Network resources can also be configured dynamically, allowing for changes to be made without restarting the virtual machine. Even while virtualized, systems can continue a normal backup schedule to both the local appliance and the secure cloud.

The advantages to Instant Virtualisation are many. Should a business experience server failure, or the like, its systems may be virtualised instantly on the local device or the secure cloud, to avoid data loss and downtime. With the systems virtualized in the Cloud, the business may operate “business as usual” and have the time and resources to fix its server issue without compromising any data or incurring any downtime.

Ransomware Detection

The only sure way to resolve a ransom-ware attack is to restore the infected systems, effectively turning back the clock. With ransom-ware detection and point in time rollback, is designed to identify an attack, notify administrators, and recover from just these scenarios. Within minutes, it can be as if the ransom-ware never happened. Say goodbye to ransom-ware and other disasters, and hello to simple preventative measures.

Hybrid Cloud

Hybrid Cloud Technology to improve redundancy and allow users greater protection of their systems and data. Hybrid Cloud continuity is simple in concept yet robust in feature set; it leverages the advantages of local backup and the security of the cloud.

It starts with workstations and servers protecting data locally across the Local Area Network (LAN) to the local appliance from there it is scheduled to be transmitted to the secure cloud.

This technology improves fault tolerance while reducing the reliance on bandwidth speed. The local device can act as a restore hub for everything from files to application and system fail over, it can also act as a staging environment for offsite transfer.

Scheduling off-site data transfers can be critical for bandwidth management and carries no risk of having unsaved backups. In addition, should the local device be compromised data that was transferred to the Cloud can act as a replica site for the business.

A local only backup option cannot ensure data integrity should a site wide disaster occur.

Inverse Chain Technology

This eliminates problems in the backup chain, where most problems occur in the backup process.

Each time a backup occurs data is saved in a universal virtual file format (VMDK). These backups are not dependent on previous snapshots allowing for freedom over changing retention and deleting snapshots without resetting the chain or dropping a new base image.

Since each backup is a fully bootable virtual machine, there is no need for a conversion to occur before performing a restore. With no complicated roll-up or restore processes, data is always available immediately both on-site and off-site.

Inverse Chain Technology avoids broken backup chains and enables virtualization to happen almost instantaneously and without risk of broken backup chains.

Backup Insights

Backup Insights has the ability to identify file and application changes between any two backup points. It can recover files and applications directly from the interface with almost no information about when they were lost or even where on the machine they resided.

Users can intelligently track trends over time to see what files have been created, modified and deleted. This tool is extremely easy to use and can be accessed right from the user interface.

In a matter of seconds, we can simultaneously mount points and see all files broken down with an easy to read file tree.

This substantially reduces the time taken to search for lost or deleted files or folders saving time and money.

Screenshot Backup Verification

This proprietary technology delivers proof that your backup is successful. By taking a “screenshot” of each completed boot process virtually. This tests the backup integrity and proactively identifies boot-ability issues through the use of automated scripts.  

A screenshot alert can then be sent directly to us, and to you, so you can see your backed up server works.

Testing is taken to a new level with automated live virtualization verification. This not only checks the integrity of a backup but it actually does a mock recovery and spins up a virtual machine of the backup to verify the backup can be booted in

For more information, please contact us on the form below!

Name *