Remote backup service: Difference between revisions

Content deleted Content added
MOS:BOLDSYN
fingerprints
Tags: Mobile edit Mobile web edit
 
(15 intermediate revisions by 12 users not shown)
Line 1:
{{Short description|Service


that provides users with a system for the backup, storage, and recovery of computer files}}
{{Use dmy dates|date=JuneMarch 20132023}}
{{internet hosting}}
A '''remote''', '''online''', or '''managed backup service''', sometimes marketed as '''cloud backup''' or '''backup-as-a-service''', is a service that provides users with a system for the [[backup]], storage, and recovery of [[computer file]]s. [[List of online backup services|Online backup providers]] are companies that provide this type of service to end users (or clients). Such backup services are considered a form of [[cloud computing]].
Line 24 ⟶ 27:
===Ubiquitous access===
#Cloud BUR utilizes standard networking protocols (which today are primarily but not exclusively IP based) to transfer data between the customer and the service provider.
#Vaults or repositories need to be always available to restore data to any ___location connected to the Service Provider’sProvider's Cloud via private or public networks.
 
===Scalable and elastic===
Line 33 ⟶ 36:
#Cloud Backup allows customers to align the value of data with the cost of protecting it. It is procured on a per-gigabyte per month basis. Prices tend to vary based on the age of data, type of data (email, databases, files etc.), volume, number of backup copies and RTOs.
 
Cloud Backup is a modern and efficient data backup solution that operates on a native cloud multitenant platform. This advanced platform is specifically designed to share resources among users, which makes data mobility possible for customers. With this solution, customers are not restricted to a single provider and can effortlessly move their data to another provider or back to a dedicated Private or Hybrid Cloud. The security of customer data is of utmost importance, and service providers take all necessary measures to ensure that customer data is always kept private and secure. Such security measures include making sure that customer data is never accessible to other customers. Service providers should also only access customer data with explicit permission. By adhering to these strict security measures, Cloud Backup providers can offer peace of mind to their customers and build trust in their services, making it a reliable and trustworthy data backup solution for businesses of all sizes.
===Shared and secure===
#The underlying enabling technology for Cloud Backup is a full stack native cloud multitenant platform (shared everything).
#Data mobility/portability prevents service provider lock-in and allows customers to move their data from one Service Provider to another, or entirely back into a dedicated Private Cloud (or a [[Hybrid Cloud]]).
#Security in the cloud is critical. One customer can never have access to another’s data. Additionally, even Service Providers must not be able to access their customer’s data without the customer’s permission.
 
===Enterprise-class cloud backup===
Line 48:
|publisher=TechTarget|date=May 2012}}</ref> Recent backups are retained locally, to speed data recovery operations.
 
There are a number of cloud storage appliances on the market that can be used as a backup target, including appliances from [[CTERA Networks]], [[StorSimple]] and [[TwinStrata]].<ref>Boles, Jeff. [http://searchdatabackup.techtarget.com/tutorial/Hybrid-cloud-backup-D2D2C-emerging-as-a-viable-data-backup-strategy Hybrid cloud backup: D2D2C emerging as a viable data backup strategy]. SearchDataBackup, 2 May 2011</ref>
 
Hybrid cloud backup is also beneficial for enterprise users who have security concerns. When storing data locally before sending it to the cloud, backup users can perform the necessary encryption operations, incl. technologies like:
Line 64:
 
== Typical features ==
; Encryption: Data should be encrypted before it is sent across the internet, and it should be stored in its encrypted state. [[Encryption]] should be at least 256 bits, and the user should have the option of using his own encryption key, which should never be sent to the server.
; Network backup: A backup service supporting network backup can back up multiple computers, servers or [[Network Attached Storage]] appliances on a local area network from a single computer or device.
; [[Continuous backup]] - Continuous Data Protection: Allows the service to back up continuously or on a predefined schedule. Both methods have advantages and disadvantages. Most backup services are schedule-based and perform backups at a predetermined time. Some services provide continuous data backups which are used by large financial institutions and large online retailers. However, there is typically a trade-off with performance and system resources.
; File-by-File Restore: The ability for users to restore files themselves, without the assistance of a Service Provider by allowing the user select files by name and/or folder. Some services allow users to select files by searching for filenames and folder names, by dates, by file type, by backup set, and by tags.
; Online access to files: Some services allow you to access backed-up files via a normal web browser. Many services do not provide this type of functionality.
Line 82:
;File retention policies
:Many businesses require a flexible file retention policy that can be applied to an unlimited number of groups of files called "sets".
;Fully [[managed services]]
:Some services offer a higher level of support to businesses that might request immediate help, proactive monitoring, personal visits from their service provider, or telephone support.
;Redundancy
Line 116:
* Some remote backup services will work continuously, backing up files as they are changed.
* Most remote backup services will maintain a list of versions of your files.
* Most remote backup services will use a 128 - 2048 bit encryption to send data over unsecured links (e.g. internet).
* A few remote backup services can reduce backup by only transmitting changed data.
* Manage and secure digital data information.
Line 127:
* If the encryption password is lost, data recovery will be impossible. However, with managed services this should not be a problem.
* Residential broadband services often have monthly limits that preclude large backups. They are also usually asymmetric; the user-to-network link regularly used to store backups is much slower than the network-to-user link used only when data is restored.
* In terms of price, when looking at the raw cost of hard disks, remote backups cost about 1-20 times per GB what a local backup would.<ref>Zaborszky, Peter. (2012-11-16 November 2012) [http://www.bestbackups.com/blog/1518/online-backups-worth-it-how-much-are-you-paying-per-gb-at-home/ Are online backups worth it? How much are you paying per GB at home?]. Best Backups.com. Retrieved on 2013-08-10.</ref>
 
== Managed vs. unmanaged ==
Line 137:
 
== Scheduled vs. manual vs. event-based backup ==
There are three distinct types of backup modes: scheduled, manual and Eventevent-based.
* Scheduled Backup – data is backed up according to a fixed schedule.
* Manual Backup – backup of data is triggered by user input.
Line 143:
 
== See also ==
{{cmn|
*[[Attix5 Online Backup]]
*[[Cloud storage]]
*[[Comparison of backup software]] (includes Managedmanaged backup providers)
*[[Comparison of file hosting services]]
*[[Comparison of file synchronization software]]
Line 154 ⟶ 156:
*[[Off-site data protection]] – The practice of sending data off-site for safe keeping, but not necessarily using a remote backup service.
*[[Shared disk access]]
}}
 
==References==