Select Page

Affordable Data Backup in Microsoft Azure and AWS Cloud

In our latest webinar “Affordable Data Backup in Microsoft Azure and AWS Cloud”, we discussed StoneFly CDR365™ – cloud backup and disaster recovery solution. In this blog post, we will briefly overview the webinar session and the questions that the participants asked from us.

Webinar Flow

 In the conclusion of the webinar “Getting a free trial and setting up CDR365™”, we demonstrated how users can get a free trial of CDR365™ and how it can be setup on a Windows OS.

    What’s CDR365™?  – Simplified Cloud Backup Solution with Automated Data Services

    Affordable Data Backup in Microsoft Azure and AWS Cloud

    CDR365™ – cloud backup and disaster recovery solution is a simple-to-use, easy-to-manage software solution that enables businesses to setup cloud backups in Microsoft Azure cloud and Amazon S3.

    CDR365™ provides wizards that simplify the process of setting up backups and with a number of automated services, IT environments can setup an error free and optimized backup solution. CDR365™ delivers:

    • Secure and encrypted cloud backups.
    • Scalability for continuously growing workloads.
    • Compliance to industry standards.
    • High speed backup and recovery.
    • Backup to Microsoft Azure Government.
    • Real-time and scheduled backups.
    • And more.

    Complete Hybrid Backup Solution – Effortlessly setup the 3-2-1 rule for data protection

    Experts suggest that in order to reduce the probability of data loss, the best data protection policy is the 3-2-1 rule. The 3-2-1 rule suggests creating three copies of data, storing them on two types of storage media with one offsite copy.

    CDR365™ enables businesses to effortlessly setup the 3-2-1 rule without additional hardware and large investments. With CDR365™, users can setup data redundancy and create three copies of their data. These can be created on on-premises infrastructure and in the cloud, depending on the preference of the user.

    CDR365™ integrates cloud technology with existing on-premises infrastructure, resulting in the storage of data on two different types of media. With a copy in the cloud, users have a copy offsite. With CDR365™, setting up the 3-2-1 rule is as simple as one, two, and three.

    The ability to connect existing on-premises infrastructure with cloud technology along with enterprise-level data services and features make CDR365™ a complete hybrid backup solution.

    What can you backup with CDR365™?

    CDR365™ is a flexible software, compatible with a number of operating systems, servers and virtualization environments.

    Users can integrate CDR365™ to backup:

    • Virtual Machines deployed on Microsoft Hyper-V and VMware ESX/ESXi hypervisors.
    • Windows server.
    • Linux Server/CLI.
    • MS SQL server.
    • MS Exchange.

    CDR365™ can be run on Windows, Linux and macOS operating systems and integrates Microsoft Azure (Commercial and Government) and Amazon S3 clouds with existing infrastructure.

    Main Features of CDR365™

    CDR365™ offers a number of data services, the following are the main features of the cloud backup solution:

    • Scheduling and real-time backup.
    • Purge options.
    • File/Image/Block-level backup.
    • Email notifications.
    • Bandwidth Throttling.

    Scheduling and real-time backup

    With easy to use wizards, user can setup real-time backups for their mission-critical workloads or they can setup scheduled backups to optimize backups and reduce the impact on overall IT systems. The automated backups remove the possibility of human error and ensure regular backups to deliver hyper-availability and recoverability.

    Affordable Data Backup in Microsoft Azure and AWS Cloud
    Affordable Data Backup in Microsoft Azure and AWS Cloud

    Purge Options

    Users can setup data purging to enable automated deletion of outdated data. This function enables users to deploy data retention policies and leverage their storage resources efficiently. Data purging identifies files based on the date of creation, users can specify how long they wish to keep older files. When the time span is exceeded, the purge option automatically deletes the file. This makes sure that the user doesn’t have to bear unnecessary storage costs.

    Bandwidth Throttling

    In order to deliver optimized bandwidth utilization rates, CDR365™ delivers bandwidth throttling. Offices with bandwidth limitations can leverage this service to make the most of their bandwidth and setup high speed backups and recovery for their mission critical workloads.

    Affordable Data Backup in Microsoft Azure and AWS Cloud
    Affordable Data Backup in Microsoft Azure and AWS Cloud

    Ransomware Protection

    CDR365™ detects ransomware and unauthorized encryption of files and data. If there are a number of files being encrypted, the cloud backup solution detects it and notifies users. If it’s authorized, then the user can simply enable it. Otherwise, they can choose to delete the encryption attempts and continue to work without having to worry about ransomware and data loss.

    Data Encryption

     

    To make sure user data is always protected, CDR365™ uses advanced AES 256-bit data encryption technology to protect data at rest. Data at transit is secured using SSL/TLS tunneling. The encryption technology makes sure that user data is protected and only accessibly with the relevant decryption key.

     

    Compliant Backup Solution – Comply to a number of industry regulations

     

    With CDR365™ users can deploy a compliant cloud backup solution. With a proper backup and disaster recovery plan, CDR365™ cloud backup solution can be leveraged to comply to a number of industry regulations like HIPAA/HITRUST, FedRAMP, CJIS and more.

     

    Some of the industry regulations include:

    Affordable Data Backup in Microsoft Azure and AWS Cloud

    Getting a free trial & Setting up CDR365™

    In order to get a free trial of CDR365™, users just have to fill out a form. After each required field is filled, the user gets an email with the download link and the credentials for their free trial.

    The setup process is simple, the setup wizards do all the work for the users. We encourage you to watch the recording of the webinar. We have demonstrated the setup process.

    Questions about CDR365™

    For the webinar, we had a great audience and received a number of questions. We answered some of them and corresponded with the rest via email. Here are some of the questions:

    Q1. Where do I install the software? Do I need a dedicated server?

    Ans. You can install it on the workstation you wish to backup. You do not need a dedicated server or hardware for CDR365™. If you wish to setup a dedicated server, then StoneFly offers a number of backup solutions that can facilitate enterprise-level data protection requirements.

    Q2. How can I integrate CDR365™ with my current Windows infrastructure?

    Ans. CDR365™ is a flexible cloud backup solution. It supports Windows, Linux and macOS operating system. You can download the version of CDR365™ that corresponds with your operating system.

    You can explore the supported downloads of CDR365™ here: CDR365™ downloads.

    If you liked this webinar or are interested in StoneFly’s products, then we’d like you to join us for another upcoming webinar about StoneFly Smart Cloud gateway to Azure, and AWS S3.

    You can register for the upcoming webinar here: Reduce Costs and move data to Azure, AWS and any other S3 compatible cloud.

    Interested about CDR365™? You can learn more here: CDR365™ Backup and Disaster Recovery in the Cloud.

    If you have any queries, we encourage you to give us a call at 510 265 1616 or send us an email at [email protected].

    Conti Ransomware: In-Depth Technical Breakdown

    Conti Ransomware: In-Depth Technical Breakdown

    Conti ransomware has earned notoriety, notably for its involvement in the Costa Rican government hack. Operating as a ransomware-as-a-service (RaaS) group, Conti specializes in infiltrating networks, encrypting crucial data, and extorting exorbitant sums of money. In...

    Supply Chain Attack: The Achilles’ Heel of Enterprise Security

    Supply Chain Attack: The Achilles’ Heel of Enterprise Security

    Supply chain attacks have emerged as a formidable threat vector in the landscape of cybercrime, posing significant risks to enterprises of all sizes and industries. Among the various tactics employed by threat actors, ransomware attacks leveraging supply chain...

    How to Set Up S3 Object Storage for Veeam Data Platform

    How to Set Up S3 Object Storage for Veeam Data Platform

    Veeam v12 introduced Direct-to-Object storage, enabling S3 object storage as the primary backup repository. Prior to this, S3 object storage integration relied on Veeam's Scale-Out Backup Repository (SOBR), using a performance tier and a capacity tier, which extended...

    Watering Hole Attacks Unveiled: A Comprehensive Cyberthreat Overview

    Watering Hole Attacks Unveiled: A Comprehensive Cyberthreat Overview

    Watering hole attacks, akin to their namesake in the natural world where predators strategically position themselves near watering holes to intercept prey, have become a significant peril in the digital realm. In the vast landscape of cybersecurity, understanding the...

    Man-in-the-Middle Attack: Cyberthreat Amidst Data Streams

    Man-in-the-Middle Attack: Cyberthreat Amidst Data Streams

    In the fast-paced arena of enterprise-level digital operations, the looming threat of cyber vulnerabilities demands our undivided attention. Among these threats, the Man-in-the-Middle (MitM) attack emerges as a silent, yet formidable, adversary capable of infiltrating...

    You May Also Like

    Subscribe To Our Newsletter

    Join our mailing list to receive the latest news, updates, and promotions from StoneFly.

    Please Confirm your subscription from the email