What about mobile users who are often not connected to the network – how can they be protected?
Our next release [Q1 '09] will provide offline support and file caching until the user reconnect. Later this year we plan to support backing up files to a user specified location – which could include a local hard drive, SAN, or NAS.
Why do studies show that many smaller business still do not back up their data, although the word is out and has been out for years that they should do it?
Small businesses have been slow to adopt because available solutions have failed to deliver the economies of scale large enterprises enjoy. Small businesses are overwhelmed with things they “should” do, but that are two difficult or time consuming to implement. Small businesses adopt DiskAgent because of its ease of use, economical pricing, and because the trusted solutions providers they already work with offer it.
Is there a difference in protecting 1 or 3 computers versus a network of 50 computers?
In many cases there is a big difference but we have worked hard to reduce the administrative overhead for larger organizations while empowering them to control costs. Other considerations when managing a larger number of nodes are:
1. Ensuring bandwidth is not constrained by multiple backups running at once
2. Constraining what is or is not backed up by each user through central policies
3. Server support
4. Volume pricing
5. Flexible user privilege levels
How does the seek and destroy feature work?
Remote Delete has re two modes:
Signaled – User instructs the DiskAgent server to initiate a remote delete. Remote delete signal is delivered the next time the lost or stolen computer is online.
Fail Safe Mode – The user preconfigures DiskAgent to execute the remote delete sequence if DiskAgent cannot recognize the user, and the user cannot authenticate to either a local or remote DiskAgent service.
As for seeking a lost or stolen computer, users can remotely request that the DiskAgent post information on its internet address and other forensic data to DiskAgent support personnel, who work with ISPs and local law enforcement to recover a stolen machine.
About the Author: