- Volume Shadowing (i.e. backing
up files even when they are
exclusively open, e.g. outlook.pst)
- In-File Delta backup (i.e.
backing up only changes within
- Off-line backup mode and logout
- Real time backup server
- Supports both full backup
(database backup) and incremental
backup (transaction log backup) for
Microsoft SQL Server 7.0/2000,
Microsoft Exchange Server 2000/2003,
Lotus Domino/Notes 5.0, Oracle 8i or
above and MySQL 3.24 or above
- Run on Windows, Mac OS X,
NetWare, Unix, Linux and all other
platforms supporting a Java2 Runtime
Environment (JRE) 1.3.1 or above
- Incremental backup strategy
ensures that only new or updated
files are sent to backup server
- Backup scheduling
- Data is compress and encrypted
automatically before sending to the
DiskSave (DiskSave stores only
- Access backup data anytime,
anywhere by using a browser
- Comprehensive backup report
lists all files being backup. Backup
report will be delivered to user
automatically via email when each
backup job completed.
- Customizable data retention
policy allows user to access files
even when they have been deleted.
- Easily select the files you
would lie to back up to DiskSave by
using our Disk filter technology
2.1 Secure 128-bit SSL communication All communications between DiskSave Backup Server and your computer are transported in a 128-bit
SSL (Secure Socket Layer) channel. Although all your backup files travel through a public network
(internet), eavesdroppers have no knowledge of what has been exchanged.
2.2 Backup data is securely encrypted All of your files are first zipped and encrypted with your defined encrypting key before they are sent
To the DiskSave backup server. To all people but you, your files stored on DiskSave backup server are no
more than some garbage files with random content.
2.3 Encrypting key are well protected
The encrypting key used to encrypt your files resides only on your computer and is known only to
you. It is never transmitted anywhere across the network. Thus, even the system administrators wil
not be able to decrypt and view the content of your files stored on the backup server without your
permission. This unfortunately means if the encrypting key is lost, you wil never be able to recover
your backup files.
2.4 Best encryption algorithm is used
Currently, the algorithm that we are using to encrypt your files is 128-bit Twofish. It is a block cipher
designed by Counterpane Labs. It was also one of the five Advanced Encryption Standard (AES)
finalists chosen by National Institute of Standard and Technology (NIST). It subjects to frequent
public reviews but no known attack against this algorithm has been reported.
2.5 Restrict access to data by IP addresses
You can also restrict access to your backup files from the set of IP addresses you defined. If
someone tries to access your data from an IP address not on your defined list, their access wil be
denied. This additional security ensures backup files are not open to al location, even username
and password are known.
2.6 Data Center Network Multi-homed GigE fiber optic lines fed from two different telco carries.
2.7 Data Center Security 2 stage (man trap) security for entry into data center. Our cabinets are private and locked. No other companies or persons have access to our equipment.
2.8 Data Center Power 3-phase power distribution system. 24 hour battery capacity. Diesel generator onsite