Our Online Data Backup solution offers an effective, simpler and more secure way to protect your data from failures, malicious attacks and natural disasters.

Every business that uses computers (whether laptops or fileservers) to store data will recognise the value of a reliable data backup system. The problem is that backup is only one half of the story; the ability to restore data reliably is the other. Often this aspect is ignored until after disaster occurs and the backup tapes need to be used in anger. If, as all too frequently occurs, the tape is found to be unusable then business is threatened, customers are disappointed and heads roll.

Our online data backup allows you to take advantage of the best backup technology available today and thus provide a simple and reliable backup, restore, archival and disaster recovery for your data files, emails and databases.

Using your Internet connection to automatically transfer your most important data to a secure location, you can be secure in the knowledge that your data can be made available quickly and easily whether someone has accidentally deleted a file or in the event of a major disaster.

What you get with our service

  • Off-site, encrypted, secure storage
  • Automated, scheduled backups
  • No storage devices to configure or extra tapes to buy
  • No reliance on your personnel to regularly change tapes and store them offsite.

How it works

Using the industry's leading software and hardware platforms, our service recognises and captures changes to files since the last backup session; encrypts the data for maximum security and compresses it to minimise transmission time. The encrypted data is then sent over the Internet to mass storage systems located in our secure data centre.

The initial backup is the core to the system our software uses “Fastbyte” data compression. Initial backups are conducted in one of 2 ways dependant upon the volume of data to be backed up.
Data volumes up to 40 gigabytes are backed up oneline usually at a weekend to avoid any disruption to the client.
For volumes above this size a technician visits the client with one of our backup servers and secures the initial backup connected directly to the network thus utilising the lan bandwidth for a faster backup. When completed the temporary server is returned to our data centre and the information is transferred to the Master backup server.
Now that our data centre has a complete backup of your system FastByte takes over and carries out incremental backups every hour, compressing the file changes to a mere fraction of the original size therefore using a little and often premise only backing up the changes which in most instances are less than a few megabytes.

The most efficient backup technology available today, FastByte technology can accurately extract only the changes that you've made to a file since your last backup. This efficiency is achieved by using the powerful FastByte difference engine to identify and extract the binary-level differences on two versions of any file. On average, FastByte backups are more than 6 times smaller and faster than similar block technologies, which translates to using only 1/6 of the bandwidth and server storage space. 

Multiple Version Restoration
All users have instant access to restore any version of their data files. Although each incremental backup contains the small changed portions of the file, the server software has the capability of recovering any version of a file from the initial backup to the last incremental backup and EVERY version in between up to 60 days.

Automatic Online Upgrades
All version upgrades can be distributed to all end-users automatically after completing a backup. When new versions of the Online Backup software are available, the update patches can be placed on the server to allow client to automatically get updated to the latest version. All update patches are created with the same FastByte technology to reduce transfer time. Upgrades happen seamlessly without any user intervention required.


Event Manager
If a scheduled backup is missed, the next time the computer is started the Event Manager will display the missed event and allow the user to immediately perform the missed event. f a backup fails to complete successfully, the Event Manager will try the backup again when the computer is restarted or the client is executed. If a backup fails due to a network problem, the Event Manager will prompt the user to complete the backup at a later date.

E-mail Notification
The Online Backup software can be configured to send an e-mail to any user(s) upon any successful backup or a backup with errors or warnings. A summary of the attempt is sent in the body of the message and the complete log file may be attached as an option.

Backup Sets
The client software features the ability to create an unlimited number of backup sets. Since backup sets can be scheduled to run independently, they can be configured for multiple backup sets to run at different times. For example, a backup set containing all data files can be configured to run at the end of each week and another backup set containing a single database file can be configured to run multiple times per day. All file versions will still be immediately available for restore.

Advanced Encryption
All data is stored in an encrypted format and all communications between the client and server are encrypted. Users can choose between DES, Triple-DES and Blowfish encryption algorithms. The software is available with exportable levels of encryption for International customers.

File Filters Including or excluding files from the backup selection is possible with set filters that can be created manually or with an easy-to-use filter wizard. Filters can be created to include all data files on a users system to avoid hunting through a hard drive for all of the data files. Filters can easily be shared with any other users.

Enhanced Scheduling Enhanced scheduling options in the client software to help automate the backup process. The new scheduling capabilities allow users to configure backups at any time, multiple times per day or even before Windows Shut Down. Additionally, any third party scheduling application can be used to run the backup application by scheduling simple command line calls to run an automated backup.

System Tray Control Upon installation, a small application is configured to run in your Windows System Tray. (The Windows System Tray is located at the bottom right-hand corner of your computer screen.) This application monitors the scheduling process and give the end user quick access to a number of useful functions.

Log File Review and Printing
All backup and restore transactions are thoroughly logged on the client and the server applications. The user can quickly review and print the client logs from the client application. The server maintains a Master Log of all general user activity and records detailed information for each user to help track usage and aid in technical support.

CPU Utilization Since the FastByte technology leverages the CPU power to get the great file reductions, it can be taxing on the processor. Since some backups are done while the user is working on the system and some backups are done after hours when the user is away, we allow the CPU utilization to be configured. Users can give the backup application all the processing power it needs, or make the backup application subordinate to other tasks.