
Description of the service:
The process will start on the respective servers to be protected by generating an encrypted copy of the information using a security key. Then the data is transmitted over the Internet to a datacenter where the correct status of the copies is monitored every day. In the configuration process, an encryption key will be required, which will only be known by the client. This key is necessary to decrypt the information safeguarded Tecsens staff do not know the encryption key so they will never be able to access the information. This system works in an automated way and although it can work in an unattended way, Tecsens reviews the copies every day.
Data recovery:
Through the Internet, the client can check the status of the copies, the versions saved and in case you need to retrieve the information, you will have access codes to make it available quickly and easily.
It is possible to include additional services of: first copy, restoration in physical, connection via dedicated line, vaulting (physical copy custody), recovery of damaged disks, disaster recovery consulting.
The service includes the necessary licenses for the service, and the main operating systems are supported: Windows 2003-2008, XP, Vista, W7-10, Linux, Solaris, Unix, Netware, and Mac.