1 / 10

Data Backup Security - One2backup

Your files are protected using 448 bit Blowfish Encryption before they leave your PC. This extremely secure "bank grade" encryption algorithm has never been cracked. Your files are then stored in this encrypted state at our secure data center.<br>

one2backup
Download Presentation

Data Backup Security - One2backup

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. One2Backup Secure | Automatic | Online Data Backup Security https://one2backup.com/

  2. Strong Encryption Your files are protected using 448 bit Blowfish Encryption before they leave your PC. This extremely secure "bank grade" encryption algorithm has never been cracked. Your files are then stored in this encrypted state at our secure data centre. https://one2backup.com/Security.aspx

  3. Individual Data Security With One2backup™, each user gets their own individual account and password. This means that each user also gets a unique encryption key. This encryption key ensures that while your data backup is securely stored at our data centre, only you have access to your data storage. In fact, even our most privileged systems administrators do not have the ability to decrypt your data. https://one2backup.com/Security.aspx#undefined2

  4. Password Security Great lengths are taken in our system to ensure your password remains a secret. Our password security practices have been modeled after premier online banking web sites.Yourpassword is encrypted before it is stored in our database. At no point is an administrator able to retrieve your password. Nor does an administrator have the ability to set your password to a known value. https://one2backup.com/Security.aspx#undefined3

  5. Secure Data Centre Your data is securely stored in our Carrier Grade data centre. Our all Cisco based switched network employs redundant Internet providers, redundant routers, and redundant firewalls. We use BGP and HSRP protocols to implement fail-over and redundancy. Our data centre was up and running throughout the big blackout of August 2003. https://one2backup.com/Security.aspx#undefined4

  6. End to End Verification As each file is transferred to our data centre, we carefully verify its integrity against a known CRC signature. Files are re-verified each time they are written to disk. If any file fails verification, it is retransmitted from your PC or recovered from the replica server. This ensures that the data stored on our servers is the same data that was stored on your PC. https://one2backup.com/Security.aspx#undefined5

  7. Secure Protocol The One2backup™ client communicates with our servers over a proprietary protocol that was designed specifically for Internet data backup. Other Internet backup products that use popular web protocols like HTTP, FTP, or WebDav can be vulnerable to hacker and virus attacks. The extreme popularity of these protocols makes them a target. It is extremely unlikely that a hacker is going to invest the time and effort to go after a proprietary protocol. Even if they did, the 448 bit Blowfish Encryption has never been broken. https://one2backup.com/Security.aspx#undefined6

  8. Firewalls To maximize compatibility with home and corporate firewalls, the protocol used by our Backup Client was designed to look to a firewall just like the SSL protocol used in web browsers. This means that if you are able to surf to our web site, you will be able to connect with our backup software. https://one2backup.com/Security.aspx#undefined7

  9. Corporate Remote Access Policy Many organizations have a policy to control access to their data from outside of the organization. VPNs and Firewalls are generally used to control this, but become ineffective when the data is stored off-site. The same features that empower a laptop user to backup and restore his data while on the road may violate corporate information policy. https://one2backup.com/Security.aspx#undefined8

  10. CONTACT US One2Backup 12 Blair Road, Pinetown, Kwazulu Natal, South Africa Call Us: 0861 727283 Fax Us: 0866 476382 info@One2backup.com Secure | automatic | online https://one2backup.com/ContactUs.aspx

More Related