Backup And Restore Challenges In Today’s High Threat Environment

advanced data protection

On & Off Site Data Protection Delivers Disaster Protection

Collecting and processing data is part of every company to a certain extent. Some make a living with it, others just have their customer data, emails and notes digitized. They use them constantly and aren’t aware how existential it is to their work. DTI / Pricewaterhouse Coopers, the University of Texas and the CPSR Corporation all agree that 94% of all companies that experience data loss will declare bankruptcy within the next two years. The NFIB (National Federation of Independent Business) states that 30% of small businesses will experience a natural disaster and 10% will experience a major data loss as result of a human error. That is a 37% risk that any company can experience data loss and 94% of them will declare bankruptcy. In conclusion there is a 35% chance of closing the company if no Disaster Recovery plan is present.

An off-site backup storage is essential for the worst case scenario, and here are a few examples of how Open-E JovianDSS can solve the issue.

What is it and how can you benefit?

Data protection is the process of safeguarding important information from corruption, compromise or loss. The importance of data protection increases as the amount of data created and stored continues to grow at unprecedented rates. There is also little tolerance for downtime that can make it impossible to access important information.

  • Backup of everything
    All running virtual machines with applications and data, even databases backups are consistent.
  • Solved problem of backup window
    Backup window reduced to minutes, only data changes are replicated every interval.
  • Protection against Ransomware
    Very frequent snapshots with instant access to all data provide quick way to roll-back to the state before a virus attack.
  • Instant access to and restore of previous data versions
    Old data versions can be accessed and restored quickly. Via SMB every user has direct access to “Previous Versions” without the help of an administrator.
  • Very light backup engine
    Continuous interval-based replication works in the background with insignificant influence on production. Option to skip virtual machine snapshots in very heavy load time frames in VMware environments. Third party backup solutions are “very heavy” and generate high load during backup.
  • Optional removal and rotation of backup media
    Thanks to Export/Import users can safely remove the backup media (disks), rotate with other sets, or ship to another location.
  • Encrypted transport
    Data stream is sent via SSH for safe transport via the Internet.


Consequently, a large part of a data protection strategy is ensuring that data can be restored quickly after any corruption or loss. Protecting data from compromise and ensuring data privacy are other key components of data protection. The term data protection is used to describe both the operational backup of data and business continuity/disaster recovery. Data protection strategies are evolving along two lines: data availability and data management.

Data availability ensures users have the data they need to conduct business even if the data is damaged or lost.

How Does It Protect Your Data?

On-site (Local) Data Protection

  • Stores data periodically on same server or local storage devices
  • Prevents data loss caused by Ransomware attacks, hardware failure, theft etc.
  • Enables immediate access to hot data without an internet connection
  • Minimizes downtime as the backup server takes over during the restore process

Off-site (Remote) Data Protection

  • Keeps often and seldom used data safe through backup copies to remote locations
  • Transfers encrypted data via Internet for maximum security
  • Enhances security with additional copies of data in different remote locations
  • Enables a full restore process of all company data


Historically, data backup has been about making duplicate copies of data. Disaster recovery, on the other hand, has focused on how backups are used once a disaster happens.

Snapshots and replication have made it possible to recover much faster from a disaster than in the past. When a server fails, data from a backup array is used in place of the primary storage, but only if steps are taken to prevent that backup from being modified. Those steps involve using a snapshot of the data from the backup array to immediately create a differencing disk. The original data from the backup array is then used for read operations, and write operations are directed to the differencing disk. This approach leaves the original backup data unchanged. And while all this is happening, the failed server’s storage is rebuilt and data replicated from the backup array to the failed server’s newly rebuilt storage. Once the replication is complete, the contents of the differencing disk are merged onto the server’s storage and users are back in business.


On- & Off-site Data Protection + High Availability Cluster
= Maximum Data Security


On-& Off-site Data Protection

  • Protects data by constantly backing it up and storing copies both locally and remotely
  • Allows restoring data to a previously saved point in time in case of hardware failure or data corruption

High Availability Cluster

  • Ensures business continuity by providing uninterrupted access to data even during hardware failures
  • Maximizes utilization of hardware and network resources

On-&Off-site Data Protection complements High Availability Clusters, but does not replace them!


Level 5 data protection: On-site & Off-site Data Protection with HA

backup and restore data protection

  • High-Availability Open-E JovianDSS production server
  • Backup on local pool
  • Backup on system in same location
  • Backup on remote site


Arxys | Intego series Fully Protect Your Organization Against Today’s Modern Threats

disaster recovery


Scroll to Top