Home | Ubistor Smart Solutions

  • Support866 312 STORoption 2
  • Sales866 312 STORoption 3
  • Contact Usinfo@ubistor.com
Faqs

Faqs

SafeStor - General Questions

1. What data backup packages or options do you provide?

A: We allow customers to select from 2 different packages to best fit their business needs: SafeStor – A premier online backup and recovery service for small to mid-size businesses with larger data sets and more stringent compliance requirements. SafeStor Enterprise Solution – A Customizable online backup and recovery managed service for medium- to large-size businesses that require a full service, externally resourced data protection infrastructure.An exclusive online backup and recovery managed service for medium to large businesses.

2. How is SafeStor online data backup different from software?

A: SafeStor is a Software as a Service (SaaS) fully managed solution. Customers data is saved to an UbiStor Tier III or Tier IV data center instead of their own data center. We manage the entire backup infrastructure for customers: vault software, replication processes, management, reporting consoles, storage, and hardware. The full infrastructure is certified for SAS-70 Type II compliance on a regular basis.

3. How does the SafeStor solution work?

A: SafeStor is a simple set-and-forget solution that is up and running in 3 easy steps:

  1. Install: Customers install a local agent onto the protected machine and configure the backup schedule in a web-based console.
  2. Seed: An initial snapshot of the data can be seeded over the wire or by using a physical seeding device.
  3. Backup: Per the configured backup schedule, the agent will capture any changed data since the last backup, compress and encrypt the changes, and securely transfer to the UbiStor data center.

Should the data need to be recovered, UbiStor offers the broadest array of recovery options. See “What recovery options are provided?” FAQ for more details about recovery.

4. How do you identify which product is the right solution for a customer?

A: Ask questions around price sensitivity, environment (OS, applications, type of data), regulatory requirement (DR, retentions), customization needs, and backup oversight.

  • Sample questions to narrow the package:
  • What is causing you to seek out an online backup solution?
  • What would be the business impact of not adopting a solution?
  • What recovery requirements must be met by your chosen solution (RTO, RPO, granularity of recovery, proximity of data)
  • What regulatory requirements must you fulfill with your backup solution?
  • What are your top selection criteria for a solution?
  • What systems and applications need to be protected?
  • Who would be responsible for monitoring and managing backups on a daily basis?
Criteria   SafeStor SafeStor Enterprise
Price sensitive   Medium Medium
Environment   Mixed Mixed
Granular email recovery   Yes Yes
Onsite recovery (appliance)   Yes Yes
Long-term data retention   Yes Yes
Desires full service solution     Yes
Requires customization     Yes
Desires dedicated infrastructure     Yes

 

5. What are the differences between the different packages or options?

A:    SafeStor is geared towards small to mid-sized businesses and ROBOs with growing data sets, compliance, security needs, and/or heterogeneous computing environments. Target businesses are willing to pay a premium for protection of their more sophisticated IT infrastructure. Many need to meet regulatory requirements for security and data retention, thus need to centrally control data in headquarters in addition to ROBOs. Retentions are customizable from 7 days to years with capability to have different retention per data backup set.
    SafeStor Enterprise Solution is geared towards mid to large-sized business with the largest data sets, mature IT infrastructures, and the strongest service requirements. Most require lower recovery time objectives in conjunction with offsite protection. These organizations are looking for everything SaaS provides plus a full service, high quality dedicated infrastructure and support team. Retentions are custom.
 

SafeStor - Infrastructure and Security

1. What is SAS 70 Type II Certification?

A: It is the result of successfully passing an audit based on the Statement on Auditing Standards, developed by the American Institute of Certified Public Accountants (AICPA), and recognized internationally. The highest level of SAS 70 certification, Type II, requires an “inside view” including detailed testing of a service organization’s internal practices around security, application development, maintenance, processing, and business continuity plan. The rigor and comprehensiveness of the SAS 70 Type II certification process are why backup service vendors and their customers rely on such audits as industry standard. This assures our customers that the process by which we back up their data has been tested and certified by an independent party. Our proven processes ensure customers’ data is protected and cannot be accessed by anyone but specific individuals within their company who have the appropriate user access—not even UbiStor has visibility into their data.

2. How secure is SafeStor?

A: We offer 6 levels of encryption including 256 AES. When the automated backup starts, it builds a 128 AES encrypted tunnel to our infrastructure that resides in a data center with 24 hour guards, man-traps, geometric hand scanners and certified security processes with personal access. Data at rest remains in an encrypted state at all times and only the client has the ability to restore data.

3. Can you provide me with details on your infrastructure at these data centers?

A: UbiStor’s world-class data centers are constructed to carrier-class specifications. All customer data is stored on state-of-the-art fully redundant hardware, continually backed up, and proactively monitored around the clock. In order to enter the vaulting facilities, personnel are required to meet security clearance and the facilities include man traps, geometric hand scan and individual cabinet security. The facilities employ 24-hour security and climate/humidity monitoring to ensure full protection of the hardware and data. Each data center is supplied with redundant power and Internet connections and includes fire and earthquake protection. Our data centers are SAS 70 Type II certified.

SafeStor - Customers

1. How many customers are using the backup service?

A: We have over 28,000 customers using the technology today worldwide.

SafeStor - Technology

1. What backup retentions do you support?

A: We provide flexible retentions based on a customer needs: 7 days, 30 days, 30 days + 11 monthly backups, as well as custom retentions which are set by the customer. Retentions can also be configured per backup data set. Customers choose a SaaS package with retentions that meet their needs.

2. What recovery options are provided?

A: We provide multiple recovery options:

  • File/Folder Recovery: Customers can recover data online by simply going to a web interface and selecting the backup set they want to recover.
  • System Recovery: Customers can use SafeStor System Restore to quickly recover an unusable system after catastrophic failure. In just minutes, customers initiate recovery of a system onto similar hardware, dissimilar hardware, or a virtual machine. It integrates seamlessly with SafeStor backups, and can restore both system and data in a single pass. Customers get a unified solution that eliminates the need for multiple backups and dramatically reduces downtime.
  • Large Amount of Data Recovery: Customers can use UbiStor Data Transfer Services to transfer data to or from an UbiStor data center. This service enables customers to seed or recover data more quickly than over the internet using rented storage appliances.
  • Onsite Recovery: Customers can use the Express Recovery Appliance. The appliance is a pre-configured storage appliance for customers to install as a local storage device (or vault) in remote and branch offices. It provides customers with LAN-speed backups and restores in addition to offsite disaster recovery protection.
  • Site Recovery: For a complete site outage, we provide the Remote Virtual Disaster Recovery (VDR). VDR is a hosted service to help customers quickly recover key servers and data after a site disaster, and remotely access them in a secure virtual environment.

3. Is the SafeStor data encrypted?

A: Yes, data is encrypted end-to-end. Only a customer with the encryption password can decrypt data. UbiStor does NOT have access to customer data. Data can be encrypted during backups using a number of encryption algorithms, including the highest level of encryption, 256 AES. Data can also be encrypted in transit, using 128-bit encryption.

4. What platforms does SafeStor support?

A: We support Windows, Linux, Solaris, HP-UX, IBM AIX, IBMi, VMWare, and Novell Netware.

5. What is your pricing model for the backup solution?

A: Customers pay a monthly subscription fee based on the following:

  • Contracted service
  • Length of agreement
  • Amount of committed GB/TB
  • Retention scheme

6. Do customers pay for agents and plug-ins?

A: It depends on the service.   

  • For SafeStor, all agents are included in the monthly subscription but plug-ins, System Restore and SafeStor Real Time Protection are additional.
  • For SafeStor Enterprise, customers are charged an up-front fee for director, agents and plug-ins software. Financing options are available to achieve a set monthly fee over a term.

 

7. What is unique about UbiStor’s offering? (Or what differentiates your SaaS technology?)

A: UbiStor SafeStor unique strengths are:

  • Best of breed technology that grows with customers
    • Comprehensive product line based on an integrated SafeStor platform – as companies expand, our data protection technology expands with them.
    • Powerful and easy to understand; they work painlessly for over 28,000 customers.
  • Focus on data recovery, not just backup
    • Products, customer service, infrastructure prepared for the unexpected and designed to give customers seamless recovery.
    • Offer many options for recovering customer data, based on their unique needs.
    • Perform over 10,000 recoveries per month
  • Secure, reliable data protection infrastructure
    • Our lights are always on, managing nearly 1 petabyte of data in our ecosystem within Tier 3 and 4 Top-Tier Data Centers, with SAS 70 and NIST Certified AES Encryption.
  •  Optimized performance, via end to end compression and data de-duplication.
    • Single, integrated, optimized high performance solution - using DeltaPro technology for front end incremental backups, compression and encryption in flight and at rest, and back-end data de-duplication
  • World class customer support
    • Reach live support experts by phone whenever you need help, 24/7
    • Tiered support staff of highly trained experts
    • Managed Service, Professional Service teams help customers build, test and execute their data protection strategy.
    • Almost 100% customer satisfaction
  • Trusted: Credibility, longevity, brand
    • Trusted experts for over 28,000 customers
    • Less than 1% customer attrition
  • Roadmap Approach
    • We provide a building block approach to disaster recovery and business continuity. Starting with data protection, then virtual DR to full hosting.
    • All data is not the same – we ensure the proper solutions are put in place based upon data classification
  • All applications are not the same – we ensure the proper solutions are put in place based upon recovery time objectivesFinancial Flexibility
    • For SafeStor we provide SaaS pay as you go model
    • For SafeStor Enterprise Solutions we provide options for capital purchase, lease or utility financial models.

8. Do you support de-duplication in SafeStor?

A. Yes. On the front-end, after an initial seed backup, our Delta Pro technology only sends changed or new blocks of data within files to storage. The product then further compresses the data before being sent to the secure server. We further reduce data in storage by eliminating duplicate blocks of data within backup jobs. Together, these technologies significantly reduce backup windows by minimizing the amount of data sent into storage and also reduce storage footprints.

9. What applications does SafeStor support?

A: We support Microsoft Exchange, Microsoft SQL Server, Microsoft Clusters, Microsoft SharePoint, and Oracle.

SafeStor - Competition

1. Who are your competitors in the space?

A: In the past year, it’s been all about the cloud. Traditional backup software vendors are announcing cloud products. But we compete most directly with online backup providers including Barracuda Backup Service, Iron Mountain Digital, EMC Mozy, and Asigra MSPs.

SafeStor Endpoint - General Questions

1. What kind of systems does SafeStor Endpoint Protection cover?

A: Protect data on all your machines: from Windows, Linux, UNIX, and VMware servers; to Oracle and Microsoft SQL Server and Exchange applications; to Windows 7, Windows Vista, Windows XP, and Macintosh platforms.

2. How is data protection managed?

A: You and your staff can easily configure and centrally manage all backup, recovery, and security policies—including bandwidth throttling, encryption, port access controls, and remote data deletion—via the product’s web-based dashboard. And granular controls enable you to configure policies by device, user ID, or user role, and can be delegated to a trusted user.

3. How does SafeStor Endpoint Protection optimize backup performance?

A: Global deduplication ensures each data block is backed up only once, even if the same file resides on 1,000 PCs. Along with data compression, global deduplication minimizes bandwidth usage, shrinks backup windows, and reduces the storage footprint. Recoveries are faster too, because end users restore only changed blocks, not whole files.

4. Is it true that SafeStor Endpoint Protection can help track down missing PC’s?

A: TCP/IP device tracing identifies the IP address of a laptop in communication with the backup server. It’s simple: Just turn on trace capabilities at the SafeStor Endpoint Protection Server, which keeps a history and routes trace information. Device tracing effectively deters on-the-job theft—very few employees steal PCs they know can be traced—and enables law enforcement to find machines as soon as they come online.

5. How is data protected on lost or stolen devices?

A: State-of-the-art encryption locks out prying eyes for files at rest on the hard drive. Files that are backed up are encrypted automatically using FIPS 140-2 standard, to ensure compliance with regulatory mandates.

Port access controls can be used to shut down data leakage by determining who’s allowed to copy what. You can also verify access rights through the product’s policy engine, grant read or write access. You can completely lock down a port, depending on the port type—and control virtually every type of plug-in media: USB drives, CDs and DVDs, serial and parallel ports, Bluetooth devices, floppy disk and tape drives, FireWire and iSCSI devices, and more.

You will be alerted if anyone attempts to tamper with your port access controls.

Remote data deletion wipes lost or stolen laptops clean by permanently “shredding” the data, either on-demand or via a time-based trigger. You can shred the data confidently, knowing a full, current backup copy is stored and easily accessible.

6. How does SafeStor Endpoint Protection complement my Business Continuity strategy?

A: Imagine that a laptop is lost, stolen or destroyed. The risk here is data could get into the hands of the wrong people, putting business information at risk and exposing business to potential regulatory violations or public exposure. In addition, the end user is left with a few days at best of limited productivity, as IT has to restore what is available onto an alternative system. With SafeStor Endpoint Protection, all the data that resides on that system can be restored from the cloud onto an alternate device, allowing for true business continuity.

7. How does SafeStor Endpoint Protection tie to my cloud strategy?

A: SafeStor Endpoint Protection works even when PCs are offline. Data backed to the local drive, automatically transmits to the cloud the next time it connects to the network. By doing so, data is automatically backed up to the UbiStor Cloud, providing disaster protection and peace of mind.

8. How is data recovered with SafeStor Endpoint Protection?

A: Users can recover their own files in no time, using the product’s simple interface, without involving the Help Desk. This allows for end user independence; no need to wait on a help desk ticket to recover files to be productive again.

9. How does SafeStor Endpoint Protection limit impact to end users in the case of a disruption?

A: SafeStor Endpoint Protection is cloud-connected, for automatic backup to the UbiStor cloud that is easy for end users to use and provides peace of mind to organizations. SafeStor Endpoint Protection delivers “silent,” continuous protection; simple, self-directed restores; and cloud-connected backup that stores data both locally and in the cloud. That means end users can continue working while their data is being backed up in the background.

10. What is SafeStor Endpoint Protection?

A: SafeStor Endpoint Protection is an integrated desktop/laptop backup, recovery and data security solution that helps control data across mobile workforces. This solution protects corporate data exposure when PCs are lost or stolen.

MailStor

1. What security levels are available to access archived data?

A: MailStor provides role based web access to the console. By default every user can access their emails but Administrator can assign access to certain users to access others emails.

2. Can search results be exported to different formats?

A. MailStor can export search results to PST, EML, HTML or MSG formats.

3. How are emails captured by MailStor?

A: MailStor extracts emails from Microsoft journal mailbox and archives to the MailStor Archive Stores.

4. How do end users access their archived emails?

A: Users can either login to the MailStor Web Console using their active directory username / password or access it through the MailStor Console link created in Outlook automatically.

5. How much space is required on MailStor Server for archived emails?

A: Formula is "Storage Space required on MailStor Server = Size of all Exchange Stores + (growth of emails per year * number of years to keep emails)".

6. Does MailStor supports email archiving from multiple domains?

A: Yes, MailStor allows you to archive emails from multiple domains.

7. Does MailStor archive existing emails and offline PSTs?

A: Yes, MailStor provides PST Utility which can be used to archive existing emails and archive offline PSTs.

8. Are emails encrypted before sending to the Archive Server?

A: Emails are encrypted, digitally signed and compressed before getting sent to the MailStor Server.

9. Are emails stored compressed on MailStor Server?

A: Only email attachments are stored compressed in MailStor Archive Stores.

10. What is Single Instance Storage?

A: If an email is sent to multiple recipients then MailStor, an email archiving software, archives that email only once in the Archive Store.

11. Is MailStor Server supported on Virtual Machines?

A: Yes, MailStor Server is supported on a virtual machine as long as disks are pre-allocated for performance reasons.

12. What versions of Microsoft Exchange Servers are supported?

A: Exchange 2000, 2003, 2007 and 2010 both Standard and Enterprise in normal and clustered environment.
 

13. What is archived by MailStor?

A: Currently MailStor archive emails from Microsoft Exchange Servers and offline PSTs.

14. How are MailStor Archive Stores protected?

A: MailStor uses Microsoft SQL Server to create Archive Stores in the form of SQL Server databases. Native SQL tools can be used to backup SQL Server databases or MailStor SQL solution from MailStor can be used to backup / restore MailStor Archive Stores.

15. Is there any notification on tempered messages?

A: MailStor is well protected and no user has access to it. Only the administrator who knows the credentials can login to the MailStor solution from the back end. Even if administrator tries to update or delete any record then original message is saved; activity is logged and shows up in the tempered report and email notification is generated.

16. How granular can policies like retention, stub, content identification etc. can be set?

A: These policies can defined on an Exchange Serve, AD distribution group and individual user level. Even custom criteria on an email level can be defined using any condition but not limited to sender, recipients, date, keyword, message body etc.

17. How PSTs are archived?

 A: Put all PSTs on any one folder on MailStor; launch PST Utility and specify that folder. The rest will be done automatically by the utility. There are no complicated steps.